• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 6. Wireless Security > Know Your Enemy

Know Your Enemy

So, who are these people attacking your network and how are they doing it? To paraphrase the Harry Potter books, you need to know about dark magic to understand how to defend against it.

The tools available to monitor and even break into wireless networks aren't necessarily designed with evil intent. At best, they were developed to demonstrate that potential weaknesses were in fact security holes. Network administrators need these kinds of tools to understand how to better secure the data that flows over their networks.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint