Wireless Network Security: Setup, Issues and Threats

Email Alerts

Register now to receive SearchSecurity.co.uk-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Infosecurity 2012 Europe: Conference news and highlights

    Get the latest news and important research from the Infosecurity 2012 Europe conference, including coverage on security threats and data breaches. 

  • IT in Europe, Security Edition: Smartphone security issues

    How can security teams manage devices they don’t control? Find out how to manage smartphone and tablet security threats. 

  • Roundup: University case studies on innovative security products

    Browse this collection of university case studies from colleges that have successfully implemented innovative security products. 

  • Information Security Learning Guides

    A repository of our Learning Guides. 

  • Wi-Fi vulnerability assessment checklist

    Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions. 

  • Defeating Evil Twin attacks

    Evil Twins pose a clear and present danger to wireless users on public and private WLANs. This tip describes steps that you can take to defend users against this poorly-understood attack. Learn why SSL or SSH may not be enough to protect your users a... 

  • Combining 802.1X and VLANs for WLAN authorization

    Many WLAN owners know that 802.1X/EAP makes it possible to authenticate individual wireless users. But did you know that 802.1X can also be used to funnel wireless traffic onto VLANs, enforcing user or group-based permissions? This tip explains how t... 

  • The ins and outs of AP placement

    Many installers make the mistake of treating 802.11 WLANs just like Ethernet, placing access points (APs) in locations that facilitate outsider access to corporate networks. But, from a security perspective, WLANs should be treated like the Internet ... 

  • Wireless attacks, A to Z

    In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference list of attacks against 802.11 and 802.1X, categorized... 

  • Controlling WLAN access on a tight budget

    WPA and WPA2-Enterprise provide robust WLAN access control, but deploying 802.1X can be overwhelming for companies with limited IT staff and budget. From outsource to open source to preshared keys, this tip describes several less complex or costly al... 

  • See more Essential Knowledge on Wireless Network Security: Setup, Issues and Threats
About Wireless Network Security: Setup, Issues and Threats

Get advice and information on how to build and setup wireless network security to avoid wireless security issues and threats like hacking. Prevent network problems and learn how to securely set up your wireless network.