Professional Documents
Culture Documents
Peer-to-peer
LAN
Hotspots
Point-to-point
point bridge
Point-to-multipoint
multipoint bridge
Ethernet to wireless bridge
SSID Vulnerabilities
Open Authentication Vulnerabilities
Shared Authentication Vulnerabilities
WEP Protocol Vulnerabilities
Confidentiality
Access control
Data integrity
Authentication framework
Authentication algorithm
Data privacy or encryption algorithm
Station recommendations:
Enable wireless frame encryption where
available.
Use password protection for all your wireless
devices.
Building
Use WIPS to detect unauthorized Access Point