WLAN and IP Networking Threat and Vulnerability Analysis

CHAPTER

6

THIS CHAPTER CONSIDERS the threats and vulnerabilities that are directly associated with 802.11 wireless networks, their various topologies, and devices. It also looks at wireless local area network (WLAN) vulnerabilities within the context of IP networking and how cyberthieves and hackers leverage WLANs as the “crack in the door” to the corporate networks they attack.

Wireless networks consist of radio cards that work together in a variety of configurations to form peer-to-peer WLAN infrastructures, bridges, repeaters, extenders, backhaul networks, and distribution integration services. These are used to connect to different mediums, such as Ethernet. The radio waves ...

Get Wireless and Mobile Device Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.