Email Alerts
-
Securing embedded 802.11n devices
As WLANs are updated to 802.11n, most will be populated by increasingly diverse embedded 802.11n devices, including phones, cameras and barcode scanners. These pose unique challenges for network management and security. In this tip, learn how to cont... Tip
-
802.11n's impact on WLAN security
802.11n wireless LANs offer many benefits over 802.11a/b/g for not only performance but also network security. However, 802.11n can also bring new security threats. As businesses move full steam ahead toward bigger, faster WLANs, many factors must be... Tip
-
How to avoid the WPA wireless security standard attack
The latest crack in wireless Internet security, specifically, the Wi-Fi Protected Access (WPA) security standard, can threaten the safety of enterprise networks and company information or data. This tip shows the best way to avoid being victimized fr... Tip
-
IEEE 802.11w protects wireless LAN management frames
The IEEE 802.11w wireless encryption standard builds on the 802.11i framework to protect against subtle attacks on wireless LAN (WLAN) management frames. It will increase the confidence of network managers that applications such as wireless VoIP can ... Tip
-
Wireless security protocols -- How WPA and WPA2 work
WPA and WPA2 improve upon WEP's encryption methods for better 802.11 wireless security. WPA was carefully designed so that hardware upgrades would not be needed. The processing power of many early access points (APs) was quite limited. The RC4 cipher... Tip
-
Wireless security -- How WEP encryption works
Inadequate wireless security can jeopardize critical company information. Encryption is an important part of wireless security -- but how does it work? In this tip, first in a two-part series on 802.11 wireless security protocols, learn how WEP or Wi... Tip
-
Wireless network security: Controlling secondary connections
Corporate wireless networks can be jeopardized by workers who use unsecured secondary connections. A few steps can help protect the network against these unwanted connections. Tip
-
Wireless security -- Defending Wi-Fi clients
When it comes to wireless security, considerable attention has been paid to encrypting data, authenticating users, restricting access, and detecting rogue access points. As these network and link defenses improve, however, attackers have started to t... Tip
-
Cisco WLAN design best practices
Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community ... Tip
-
Wireless connections with ad hoc networks
Ad hoc wireless networking in Windows Vista with the IPv6 protocol has its risks, but it also has several built-in security mechanisms. In this tip, Brien Posey explains how these security features help counteract some risks of wireless networks. Tip
Network Management Strategies for the CIO