Catálogo de publicaciones - libros
Guide to Wireless Network Security
John R. Vacca
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
| Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
|---|---|---|---|---|
| No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-0-387-95425-7
ISBN electrónico
978-0-387-29845-0
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer Science+Business Media, LLC 2006
Cobertura temática
Tabla de contenidos
Wireless Network Security Solutions for Consideration
John R. Vacca
In IEEE 802.11 networks, the Service Set Identifier (SSID) is viewed by some security professionals as an unneeded advertisement of the wireless network to attackers and these professionals assert that all measures should be taken to hide the SSID. But this advertisement is the essential role that SSIDs are designed to play. The broadcast of the SSID improves the performance of a wireless network and the SSID cannot be hidden without degrading proper WLAN operations. Finally, efforts to hide the SSID are at best half-measures which lead to a false sense of security and to a degradation of wireless network performance, particularly in a roaming situation.”
Part VII - Wireless Network Security Solutions and Future Directions | Pp. 745-762
Summary, Conclusions and Recommendations
John R. Vacca
Like most advances, wireless LANs and WWANs pose both opportunities and risks. The technology can represent a powerful complement to an enterprise’s networking capabilities, enabling increased employee productivity and reducing IT costs. To minimize the attendant risks, IT administrators can implement a range of measures, including establishment of wireless security policies and practices, as well as implementation of various LAN and WAN design and implementation measures. Finally, achieving this balance of opportunity and risk allows enterprises to confidently implement wireless LANs and realize the benefits this increasingly viable technology offers.
Part VII - Wireless Network Security Solutions and Future Directions | Pp. 763-779