Data Protection
Preventing unauthorized access to the network is a critical concern in any environment. As mentioned, however, wireless traffic is available to anyone within the reach of the radio signals transmitted to and from client devices. Therefore, security professionals must also be concerned with the protection of both the payload information (the data) and the authentication credentials. This is accomplished through use of encryption algorithms.
Over the years, there have been a number of different methods of encryption and encryption implementation. Some of these methods have since been deprecated by the IEEE and other standards bodies because of weaknesses found. However, many devices that use these deprecated methods are still in ...
Get Wireless and Mobile Device Security, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.