Guide to wireless security
This learning guide presents you with an opportunity to find out all you need to know about wireless security.
Continue Reading This Article
Enjoy this article as well as all of our content, including E-Guides, news, tips and more.
Wireless Security
Here's your one-stop shopping for Wireless Security. This learning guide presents you with an opportunity to find out all you need to know about wireless security - in one spot. We hope you find this guide useful, and be sure check back often as we'll continue to update it as new and improved security details arise.
TABLE OF CONTENTS
Making sense of all those acronyms
Security protocols
Best practices
VPN and Wi-Fi security
War Driving?
Wireless analyzers
Chapter Downloads
Articles and White Papers
Descriptive Q&As
Resources
Making sense of all those acronyms
[ Return to Table of Contents ]
- Glossary Definition: WEP
- Glossary Definition: Cisco LEAP
- Glossary Definition: Service set identifier (SSID)
- EAP versus LEAP
- Differences in LEAP and PEAP
- Glossary Definition: War Driving
Security protocols
[ Return to Table of Contents ]
- Popular protocols for securing 802.11 networks
- Keeping tabs on 802.1x
Best practices
[ Return to Table of Contents ]
- Keep hands off your wireless network with this hands-on advice
- Identify malicious users
- WLAN security checklist
- Securing teleworker wireless LANs
- Locking down the airwaves
- Securing wireless, part 2: WLAN best practices
VPN and Wi-Fi Security
[ Return to Table of Contents ]
- Combining VPN and WLAN technologies (Q&A with Lisa Phifer)
- Wi-Fi(ght) a fast connection? (Article)
- Using VPNs to Secure Wireless Networks (Webcast with Lisa Phifer)
- The VPN Expert: Gateways for secure wireless access (Article)
- Using PPTP or IPsec VPN tunnels for WLAN security/gateway
War Driving
[ Return to Table of Contents ]
- War driving: Who's browsing your wireless network? (Article)
- War driving information (Web site with news and advisories)
- Granite State making peace with 'war driving' (Article)
Wireless analyzers
[ Return to Table of Contents ]
- WLAN: Analyzers and troubleshooting guide (Expert response)
- Wireless LAN Analyzers: The Ultimate Hacking Tools? (Article)
- Wireless sniffers put to test (Article)
Chapter Downloads
[ Return to Table of Contents ]
- 802.11 Security: Attacks and risks
- Cisco Wireless Security (PDF)
Articles and White Papers
[ Return to Table of Contents ]
- Wireless security best Web links
- 802.11 wireless LAN security (White Paper)
- SAFE: wireless LAN security in depth (Article)
- Wireless security (Article)
- How secure is WLAN? (Expert advice)
- Bolstering wireless LAN security (Article)
- Who's watching your wireless network? (White Paper)
Descriptive Q&A's
[ Return to Table of Contents ]
- Using PPTP or IPsec VPN tunnels for WLAN security/gateway
- WLAN security developments
- How secure is WLAN?
- Got questions? Pose your own question in our Ask the Expert feature
Resources
[ Return to Table of Contents ]
- The IEEE The 802.11i task group is working on both near-term and long-term solutions for 802.11 link layer security.
- Wi-Fi Alliance
- Mobile and Wireless Security Success: Building Security into Your Mobile Infrastructure (Webcast)