WLAN Security

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Securing embedded 802.11n devices

    As WLANs are updated to 802.11n, most will be populated by increasingly diverse embedded 802.11n devices, including phones, cameras and barcode scanners. These pose unique challenges for network management and security. In this tip, learn how to cont... 

  • 802.11n's impact on WLAN security

    802.11n wireless LANs offer many benefits over 802.11a/b/g for not only performance but also network security. However, 802.11n can also bring new security threats. As businesses move full steam ahead toward bigger, faster WLANs, many factors must be... 

  • How to avoid the WPA wireless security standard attack

    The latest crack in wireless Internet security, specifically, the Wi-Fi Protected Access (WPA) security standard, can threaten the safety of enterprise networks and company information or data. This tip shows the best way to avoid being victimized fr... 

  • IEEE 802.11w protects wireless LAN management frames

    The IEEE 802.11w wireless encryption standard builds on the 802.11i framework to protect against subtle attacks on wireless LAN (WLAN) management frames. It will increase the confidence of network managers that applications such as wireless VoIP can ... 

  • Wireless security protocols -- How WPA and WPA2 work

    WPA and WPA2 improve upon WEP's encryption methods for better 802.11 wireless security. WPA was carefully designed so that hardware upgrades would not be needed. The processing power of many early access points (APs) was quite limited. The RC4 cipher... 

  • Wireless security -- How WEP encryption works

    Inadequate wireless security can jeopardize critical company information. Encryption is an important part of wireless security -- but how does it work? In this tip, first in a two-part series on 802.11 wireless security protocols, learn how WEP or Wi... 

  • Wireless network security: Controlling secondary connections

    Corporate wireless networks can be jeopardized by workers who use unsecured secondary connections. A few steps can help protect the network against these unwanted connections. 

  • Wireless security -- Defending Wi-Fi clients

    When it comes to wireless security, considerable attention has been paid to encrypting data, authenticating users, restricting access, and detecting rogue access points. As these network and link defenses improve, however, attackers have started to t... 

  • Cisco WLAN design best practices

    Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community ... 

  • Wireless connections with ad hoc networks

    Ad hoc wireless networking in Windows Vista with the IPv6 protocol has its risks, but it also has several built-in security mechanisms. In this tip, Brien Posey explains how these security features help counteract some risks of wireless networks.