Chapter Summary

This chapter has hopefully shed some light on the technology that drives wireless and the first steps for beginning to secure a wireless network. You should be concerned about a variety of areas surrounding wireless; however, you can apply clear, layered steps to secure a wireless network with minimal impact to users. Of utmost importance are the steps you take today to increase security that will not hamper or affect the security of your wireless network. Ultimately, though, it is the responsibility of the IT department to keep users up to date on dangers and techniques to keep themselves and the network safe and secure. User awareness training and current policy is critical in this area of information security.

The chapter concluded with a discussion of the freely available tools relating to attacking and securing wireless networks. Attackers commonly use these tools; more important, however, those who want to find flaws in their wireless network security should use them to patch them up and prevent easy attacks.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.37.154