This resource is no longer available

WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises

Cover

While the TJX story was an extreme case of faulty wireless encryption, questionable data protection practices, and the Russian mafia combining to create a once-in-a-blue-moon theft, the fact is that many WLANs are vulnerable to intrusion. Even if you don't have a couple hundred million credit card numbers to protect, it's still important to choose the correct WLAN authentication method and configure it properly. This paper will explore the authentication methods available with WPA2 (Wi-Fi Protected Access 2) and identify several important best practices to consider when deploying a wireless network at home or in the enterprise.

Author

Benjamin Miller Course Director, Global Knowledge Instructor Ben Miller is the Course Director for the Global Knowledge wireless curriculum. In addition to his work as an instructor for Global Knowledge, Ben is a wireless services professional based in Los Angeles, CA. He is a CWNE (Certified Wireless Network Expert) and a CWNT (Certified Wireless Network Trainer).
Vendor:
Global Knowledge
Posted:
10 Dec 2008
Published:
11 Oct 2008
Format:
PDF
Length:
10 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.