Validating identity for wireless

Aim directional antennas toward the interior of the building in order to minimize RF signal leakage outside the building.

Network intrusion Network intrusion causes unauthorized network traffic that may be targeted to exploit vulnerabilities on systems or be associated with malicious code (e.g., worms and Trojan horse programs), or it may result in traffic that violates the organization's acceptable-use policy.

Lessons 2 and 3 focus on how to protect users and the network, respectively. Federal Treasury may be different from best practice for a fast-food retailer.

Best practice definition For wireless security, "best practice" is a relative term. This is because each enterprise may assess wireless risk differently.

Intruders can use shareware, such as Net Stumbler, combined with a high-gain antenna to scan for the existence of WLANs.

Last modified 05-Sep-2017 20:07