Catálogo de publicaciones - libros

Compartir en
redes sociales


Guide to Wireless Network Security

John R. Vacca

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-0-387-95425-7

ISBN electrónico

978-0-387-29845-0

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer Science+Business Media, LLC 2006

Tabla de contenidos

Wireless Network Security Solutions for Consideration

John R. Vacca

In IEEE 802.11 networks, the Service Set Identifier (SSID) is viewed by some security professionals as an unneeded advertisement of the wireless network to attackers and these professionals assert that all measures should be taken to hide the SSID. But this advertisement is the essential role that SSIDs are designed to play. The broadcast of the SSID improves the performance of a wireless network and the SSID cannot be hidden without degrading proper WLAN operations. Finally, efforts to hide the SSID are at best half-measures which lead to a false sense of security and to a degradation of wireless network performance, particularly in a roaming situation.”

Part VII - Wireless Network Security Solutions and Future Directions | Pp. 745-762

Summary, Conclusions and Recommendations

John R. Vacca

Like most advances, wireless LANs and WWANs pose both opportunities and risks. The technology can represent a powerful complement to an enterprise’s networking capabilities, enabling increased employee productivity and reducing IT costs. To minimize the attendant risks, IT administrators can implement a range of measures, including establishment of wireless security policies and practices, as well as implementation of various LAN and WAN design and implementation measures. Finally, achieving this balance of opportunity and risk allows enterprises to confidently implement wireless LANs and realize the benefits this increasingly viable technology offers.

Part VII - Wireless Network Security Solutions and Future Directions | Pp. 763-779