• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 14. Securing Your Privacy Using ... > How Can You Protect Yourself?

How Can You Protect Yourself?

Despite the risks and vulnerabilities that are associated with wireless networking, certain circumstances do demand their use. As with everything we do, we can take steps to minimize the risks and make hacking into a WLAN a more difficult exercise for potential intruders.

If the use of wireless technology is in the corporate environment, be sure it include it in all of the overall network security policy, procedures, and best practices. Wireless networks need to be treated under the same rules as wired networks. Extra care should be taken in implementing wireless networks because, as we saw, they are even more vulnerable than wired ones.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint