Summary


Hacking is a complex endeavor. This chapter has attempted to bring together many of the book's tools and concepts into an instructive example. As you can see in this chapter, our test network has several holes through which a hacker can walk. This is why security is paramount in a wireless setting.

A secure WLAN might have several layers of protection. For example, if a WLAN uses a firewall, VPN, WEP, and RADIUS, a hacker will be hard pressed to breach the network without stealing a laptop or mobile device that already has access to the WLAN ”and even then, the hacker would need the user account information. This is why we always recommend layered security. Your wireless network deserves nothing less.



Maximum Wireless Security
Maximum Wireless Security
ISBN: 0672324881
EAN: 2147483647
Year: 2002
Pages: 171

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net