User Segmentation

Not all users are created equal—and not all should have the same level of access. In fact, the best policy on user access is, “when in doubt, deny.” This may seem harsh, but it’s a simple matter to grant access to people who actually need it, and any aggravation they may display will quickly subside once they have access. On the other hand, problems caused intentionally or unintentionally by a person with too much access could have lasting consequences. That’s where segmentation comes in.

Generally speaking, there are two types of segmentation:

  • Internal user segmentation—This is most often accomplished via virtual local area networks (VLANs).
  • External user segmentation—This is most often achieved with either a wireless connection ...

Get Wireless and Mobile Device Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.