Wireless Security
Here's your one-stop shopping for Wireless Security. This learning guide presents you with an opportunity to find out all you need to know about wireless security - in one spot. We hope you find this guide useful, and be sure check back often as we'll continue to update it as new and improved security details arise.
Requires Free Membership to View
Making sense of all those acronyms
[ Return to Table of Contents ]
- Glossary Definition: WEP
- Glossary Definition: Cisco LEAP
- Glossary Definition: Service set identifier (SSID)
- EAP versus LEAP
- Differences in LEAP and PEAP
- Glossary Definition: War Driving
Security protocols
[ Return to Table of Contents ]
Best practices
[ Return to Table of Contents ]
- Keep hands off your wireless network with this hands-on advice
- Identify malicious users
- WLAN security checklist
- Securing teleworker wireless LANs
- Locking down the airwaves
- Securing wireless, part 2: WLAN best practices
VPN and Wi-Fi Security
[ Return to Table of Contents ]
- Combining VPN and WLAN technologies (Q&A with Lisa Phifer)
- Wi-Fi(ght) a fast connection? (Article)
- Using VPNs to Secure Wireless Networks (Webcast with Lisa Phifer)
- The VPN Expert: Gateways for secure wireless access (Article)
- Using PPTP or IPsec VPN tunnels for WLAN security/gateway
War Driving
[ Return to Table of Contents ]
- War driving: Who's browsing your wireless network? (Article)
- War driving information (Web site with news and advisories)
- Granite State making peace with 'war driving' (Article)
Wireless analyzers
[ Return to Table of Contents ]
- WLAN: Analyzers and troubleshooting guide (Expert response)
- Wireless LAN Analyzers: The Ultimate Hacking Tools? (Article)
- Wireless sniffers put to test (Article)
Chapter Downloads
[ Return to Table of Contents ]
Articles and White Papers
[ Return to Table of Contents ]
- Wireless security best Web links
- 802.11 wireless LAN security (White Paper)
- SAFE: wireless LAN security in depth (Article)
- Wireless security (Article)
- How secure is WLAN? (Expert advice)
- Bolstering wireless LAN security (Article)
- Who's watching your wireless network? (White Paper)
Descriptive Q&A's
[ Return to Table of Contents ]
- Using PPTP or IPsec VPN tunnels for WLAN security/gateway
- WLAN security developments
- How secure is WLAN?
- Got questions? Pose your own question in our Ask the Expert feature
Resources
[ Return to Table of Contents ]
- The IEEE The 802.11i task group is working on both near-term and long-term solutions for 802.11 link layer security.
- Wi-Fi Alliance
- Mobile and Wireless Security Success: Building Security into Your Mobile Infrastructure (Webcast)
This was first published in April 2003
Network Management Strategies for the CIO

Join the conversationComment
Share
Comments
Results
Contribute to the conversation