

Also included in Lesson 4 are the following technical tips:
- How to prevent wireless DoS attacks
- Rogue AP containment methods
- Wireless intrusion prevention systems: Overlay vs. embedded sensors
- How to monitor WLAN performance with WIPS
In this part:
Tip: How to prevent wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to denial-of-service attacks. A WIPS can help you detect when DoS attacks occur and where they come from, so that you can track the intruder down and bring him to justice -- and prevent future attacks. This tip offers practical advice on how to recognize and respond to DoS attacks launched against your WLAN.
Tip: Rogue AP containment methods
Many wireless network monitoring systems now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these containment features work, their potential side-effects and what network administrators should consider before activating them.
Tip: Wireless intrusion prevention systems: Overlay vs. embedded sensors
Wireless intrusion prevention systems rely on sensors to observe and forward traffic summaries to a central analysis server. Overlay WIPSes use special-purpose sensors dedicated to this monitoring task. Embedded WIPSes use APs to monitor the WLAN in their spare time. This tip compares these two WIPS approaches so that you can choose the one that best fits your network and security needs.
Tip: How to monitor WLAN performance with WIPS
Wireless intrusion prevention: the very name brings to mind security. But many WIPS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-tuning, and usage planning. This tip explains how to leverage your WIPS get more from your WLAN.
Quiz: Wireless Security School, Lesson 4
Is your understanding of WIPS up to snuff? Find out how much you retained from Lesson 4 of Wireless Lunchtime Learning.
Security Management Strategies for the CIO