A Whirlwind Tour of Wireless Vulnerabilities

A Whirlwind Tour of Wireless Vulnerabilities

Cover

Wireless, in general, and Wi-Fi, in particular, are quickly becoming the network access method of choice, those inside and outside the enterprise. Over a decade ago, when the IEEE first created 802.11, it was understood that wireless introduced new vulnerabilities, and those vulnerabilities do have to be compensated for. 

Given today’s surge in Wi-Fi client devices, it has become really tough to figure out which unknown clients pose immediate risk to the corporate network. Moreover, it is important to recognize and defend Wi-Fi clients that you do authorize, to prevent them from being compromised.

Vendor:
AirMagnet
Posted:
07 Sep 2011
Published:
07 Sep 2011
Format:
PDF
Length:
12 Page(s)
Type:
Presentation Transcript
Language:
English
Already a Bitpipe member? Login here

Download this Presentation Transcript!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor