Just the Beginning

Just the Beginning

Although this is the functional end of our teaching you how to design and implement a comprehensive security solution, it should be the beginning of your security process. After reading this book, you have the tools necessary to begin investigating security solutions of your own. This book cannot possibly provide the right answers for every security need. You have learned that security solutions cannot come out of a box in a neat little package. They need to be specifically tailored to each individual situation and should be bolstered by copious amounts of in-depth research. To effectively protect something that needs protection, you must first understand the technologies, devices, networks, and languages, as well as the risks, business needs, and users. A good security solution should take a long time to construct. It should be reviewed, and reviewed again. The first step in designing a robust solution is to know the system you are working with. Only then can you protect it with the force it deserves.

Wireless security is not fundamentally different from any other type of security. The intricacies vary, yes, but the process is the same. What we have shown in this book is that many issues associated with wireless systems need to be understood to implement tried and true security plans effectively. The security must be woven through a system and not tacked on as an afterthought. As the wireless industry grows and changes, it would behoove all players involved to make security a top priority. This will make users happy, increase revenue, and lead to secure systems that are leaps and bounds ahead of their wired predecessors.

 



Wireless Security and Privacy(c) Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques
ISBN: 0201760347
EAN: 2147483647
Year: 2002
Pages: 73

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net