Summary

Wireless networks are as common as wired networks in today's enterprise environments providing access to internal assets from anywhere on campus. With this convenience come additional attack vectors to enterprise assets and data that must be planned for and proper security mechanisms implemented for mitigation. Implementing secure encryption and authentication methods can provide a wireless network to enterprise users that meet their needs and ensure the security of enterprise assets. It is important that a layered approach of security is implemented to address the attacks common to wireless networks including having an intrusion prevention mechanism to detect and mitigate common and advanced attacks. Supporting processes for alert management is essential not only to wireless security, but also to the overall security of the enterprise. Next, we will discuss the human element of enterprise security. With all the technology in place to secure the enterprise, a simple action by a user can undermine the effectiveness of implemented controls. The next chapter will cover methods to address the risk introduced by us, the humans.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.227.10.45