Tip

Wi-Fi Security - Chapter 4

Wi-Fi Security
Chapter 4: Issues in Wireless Security
by Stewart S. Miller

This excerpt is reprinted with permission from McGraw-Hill, copyright 2003. For more information or to order the book, click here.

    Requires Free Membership to View

This chapter presents an assessment of wireless security with focus on the effective response to the three primary issues noted below:

  • Is the data adequately protected from compromise during transmission?
  • Is access to the transmission and other information on the network controlled?
  • Is there adequate protection from the range of DoS attacks?

    The specific features of the RF transmission involved are also an issue since emanations are accessible to unintended recipients:

  • What frequencies are available?
  • How much transmitter power is required to ensure successful receipt?

    We examine how security is applied in the wireless LAN and determine how these issues affect your environment. The idea is to see what pertains to your setup so that you can understand and effectively deal with these issues in your wireless security before they become a problem.

    This chapter is posted in full as a pdf file. To continue reading, click here.

    This was first published in March 2003

  • Join the conversationComment

    Share
    Comments

      Results

      Contribute to the conversation

      All fields are required. Comments will appear at the bottom of the article.

      Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.