![]() ![]() The Guide to Wireless Network Security addresses each of these areas in detail and identifies the real-world best practices needed to deploy and maintain a secure wireless network. With a defined policy in place, IT staff can turn their attentions to protecting the network from snooping and an ever-expanding list of wireless attacks. Depending on the security selected, IT will then need to establish and document the enterprise WLAN security policy, including mechanisms to validate user compliance and monitor for inherent network vulnerabilities. ![]() Network and security staff must first evaluate a potentially confusing set of authentication and encryption mechanisms to be used in the network. The steady growth of WiFi in the enterprise demands that corporate IT teams learn and adopt new security methodologies tailored to the unique requirements and weaknesses of wireless networks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |