Project Management Investigate

Securing Your Wireless

Download now Free registration required

Executive Summary

If the information sent back and forth over the WiFi network isn't adequately encrypted, a hacker can easily tap into the network and monitor one's activity. When one types personal or financial information into a Web site, that hacker can then steal that information and use it to steal one's identity. The old encryption standard Wired Equivalent Privacy (WEP) can be hacked within 30 seconds, no matter the complexity of the passphrase one can use to protect it.

  • Format: PDF
  • Size: 1116.16 KB