The Evolution of Data Networks

CHAPTER

1

ONE OF THE MOST PROFOUND CHANGES in network security over the past 10 to 15 years has been the untethering of network connectivity. The ability to log on to both the Internet and corporate networks without having to physically connect a computer to the network via an Ethernet cable has radically altered the culture and has greatly blurred the line between work life and personal life.

Although most people view the resulting changes as a net positive, both wireless and mobile networking have introduced significant security vulnerabilities to networking in general. These vulnerabilities, along with prevention and detection methods, are the focus of this text. Before jumping into the details of wireless ...

Get Wireless and Mobile Device Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.