Authentication and Access Restriction

After implementing a security-centric design, you will want to control access to the network. This can be accomplished in a number of ways, many of which are mutually reinforcing in much the same way as defense in depth. The first step is simply to hide the network. If the network is discovered, authentication plays a key role in keeping unauthorized users off the network. Access restriction is not limited to outsiders, however. There is often a need to segment internal users as well. When used together, these techniques greatly reduce the chances of unauthorized access, whatever the source.

decorative TIP

Integrating ...

Get Wireless and Mobile Device Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.