Mobility

802.11 Wireless Options: Uncovering the Reality of Common Security Practices

Download Now Free registration required

Executive Summary

The past decade's large increase in wireless devices leaves the security of those devices very much in a state of fluctuation. Unfortunately, what many users think to be the standard techniques used to implement a secure wireless network may not actually make the network truly secure enough to provide the level of protection perceived. This paper will discuss the common security techniques that are often used but may or may not provide enough security to be of real value. In this discussion, this paper will discuss changing the SSID value, determining whether or not to broadcast beacons, limiting administrative access, and using MAC filters.

  • Format: PDF
  • Size: 120.9 KB