EAP, 231 “34
advantages, 231
authentication process, 232
authentication types, 234 “40
development, 232
dynamic key generation, 230
implementation, 232
LEAP, 234 “35
EAP-MD5, 237 “38
defined, 237
security risks, 238
EAP-TLS, 235 “36
advantages, 236
defined, 235
mutual authentication, 235
security features, 237
EAP-TTLS, 236 “37
authentication, 236, 237
defined, 236
Economic and Espionage Act of 1996, 10 “11
E-mail, 172 “74
nationwide search warrants for, 108
policy, 172 “74
Win32.Sobig.F worm, 172 “74
Employees
sabotage , 7 “8
termination procedures, 170
Encryption, 33 “34
for Access Control, 33 “34
defined, 33
settings, establishing, 178
Encryption schemes, 150 “56
AES, 150 “52
DES, 152 “54
RSA encryption, 155 “56
Triple DES, 154 “55
See also WLANs
Enterprise Encryption Gateways (EEGs), 264
Enterprise Wireless Gateways (EWGs), 264 “67, 272, 284, 301
appliances, 265 “66
defined, 264 “65
firewall features, 265
scalability, 267
selection, 266
software, 266
types of, 265
uses, 265
Espionage, 72
economic, 10
industrial, 9 “12
Exploitable WLAN configurations, 199
Extensible Authentication Protocol (EAP), 271
External Access Controls, 36