Providing mobile IT pros with remote access to all business apps may put a company’s vital information at risk. Read Security in the Wireless Revolution to find out about today’s available wireless systems and the type of security you need to avoid costly and dangerous security concerns.
Wireless Security FAQ
Going wireless is a big step, and maintaining wireless
security is an ongoing process. So it’s little surprise that IT pros have so
many questions about wireless technology. We’ve gathered some of those most
frequently asked and invited our wireless expert, Brien Posey, to answer them. The
FAQ list will be constantly evolving, so you’re invited to send us other
questions you may have. Just mail them
to us or post them in the discussion area at the end of this FAQ.
Is it true that WEP can
be easily hacked?
Can a Pringles can be
used as an antenna by hackers?
Can a VPN ensure
wireless privacy?
If WEP encryption is so
insecure, then why does 802.1x rely on it?
Is it safe not to
tunnel traffic that is ultimately destined for the Internet?
How can a wireless
workstation be subject to buffer overflow attacks?
How does public key security
work?
Can a hacker attack an
access point?
Is
SSID broadcasting a security threat?
Does
MAC filtering work as a security measure?
Is
signal jamming a security issue?
Can
adjusting signal strength help secure a wireless network?
If I have implemented
all of the standard security mechanisms, can I guarantee network security?
Should I use SNMP to
manage my wireless network?
How can I audit a wireless
network?
How can I detect rogue
access points on my wireless network?