...
首页> 外文期刊>Network Computing >WATCHING THE WAVES
【24h】

WATCHING THE WAVES

机译:观看波浪

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

It's been years since the weaknesses of WEP (Wired Equivalent Privacy) came to the fore, but despite the best efforts of vendors and industry groups, the notion that it's next to impossible to secure a WLAN is still alive and kicking. The truth is, battening down your wireless LAN has gotten easier (see "Wi-Fi vs. Bad Guy," page 36). Still, despite the time and money we'll spend making sure only authenticated users gain access to wireless networks and only encrypted data goes airborne, WLAN security isn't complete. Once you build a secure WLAN, you must ensure it stays secure. Whether you're after rogue-AP (access point) alerts or detailed information on serious threats like DoS (denial-of-service) attacks, under- standing your WLAN environment is key to ensuring that your wireless network provides connectivity without compromising your company's data security. To this end, you can use the monitoring native to your WLAN infrastructure or supplement your AP setup with overlay devices. We tested both infrastructure and overlay products to find the benefits and pitfalls of each.
机译:自从WEP(有线等效保密)的弱点浮出水面已经好几年了,但是尽管供应商和行业团体做出了最大的努力,但保护WLAN几乎是不可能的想法仍然存在。事实是,抑制无线局域网变得越来越容易(请参阅第36页,“ Wi-Fi与坏人”)。尽管如此,尽管花费了时间和金钱,我们仍将花费大量时间来确保只有经过身份验证的用户才能访问无线网络,并且只有加密的数据可以传播到空中,WLAN安全性还是不完整。建立安全的WLAN后,必须确保它保持安全。无论您是要接收恶意AP(接入点)警报还是有关DoS(拒绝服务)攻击等严重威胁的详细信息,了解您的WLAN环境都是确保您的无线网络提供连接而又不损害公司安全的关键。数据安全。为此,您可以使用WLAN基础结构的本机监视,也可以使用覆盖设备补充AP设置。我们对基础设施和覆盖产品进行了测试,以发现每种产品的优势和不足。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号