• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 6. Wireless Security > Securing Data in Transit

Securing Data in Transit

As we discussed in the previous section, only casual passers-by can be deterred from joining your network, especially if you pass significant amounts of data around. Instead of stressing out about keeping people out of your wireless network, consider encrypting some, most, or all of your data in transit as it passes from your computer to its destination. By creating end-to-end encryption links using strong, currently unbreakable standards, you can keep your data completely safe from prying network sniffers. Even if someone can join your network and reach the Internet—hijacking your link—they still can't see your data. Encrypting your data in transit is a lot more difficult than setting up a closed and WEP-protected network, but eminently more sensible.

TIP

An added bonus of encrypting data from end to end is that the data becomes completely unreadable not just on your wireless network, but also on every network link between your computer and the destination machine. That's the reason large organizations typically require their employees to use encryption technology.



PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint