TAILIEUCHUNG - Using Wireless Technology Securely

Enterprise network architectures are in a constant state of flux, and due to a lack of resources and knowledgeable security expertise, some businesses are unable to maintain ongoing security best practices that include proactive security planning and ongoing optimization. Because today's security threats are so stealthy, it is often difficult to impossible to perform root cause analysis to determine how a breach or potential breach event occurred. Without actionable information produced by a root cause analysis, enterprises are unable to develop countermeasures for existing security gaps, and consequently, their businesses continue to be exposed. . | Using Wireless Technology Securely US-CERT In recent years wireless networking has become more available affordable and easy to use. Home users are adopting wireless technology in great numbers. On-the-go laptop users often find free wireless connections in places like coffee shops and airports. If you re using wireless technology or considering making the move to wireless you should know about the security threats you may encounter. This paper highlights those threats and explains what you need to know to use wireless safely both in the home and in public. You will find definitions of underlined terms in the glossary at the end of this paper. Home Wireless Threats By now you should be aware of the need to secure traditional wired internet connections. If you re planning to move to a wireless connection in your home take a moment to consider what you re doing You re connecting a device to your DSL or cable modem that broadcasts your internet connection through the air over a radio signal to your computers. If traditional wired connections are prey to security problems think of the security problems that arise when you open your internet connection to the airwaves. The following sections describe some of the threats to home wireless networks. Piggybacking If you fail to secure your wireless network anyone with a wireless-enabled computer within range of your wireless access point can hop a free ride on the internet over your wireless connection. The typical indoor broadcast range of an access point is 150 - 300 feet. Outdoors this range may extend as far as 1 000 feet. So if your neighborhood is closely settled or if you live in an apartment or condominium failure to secure your wireless network could potentially open your internet connection to a surprising number of users. Doing so invites a number of problems Service violations You may exceed the number of connections permitted by your internet service provider. Bandwidth shortages Users piggybacking on your .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.