Wireless LAN Design and Setup

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Wireless Lunchtime Learning Security School

     

  • Handheld and mobile device security: Mobile malware, breach prevention

    This mini learning guide offers tips from the experts on how to bulk up your mobile device security policies and techniques in order to protect sensitive corporate data. Our experts define common mobile device security concerns, and identify must-hav... 

  • Securing your wireless network: Preventing wireless security threats

    This mini learning guide helps enterprise information security managers and executives develop a better understanding of wireless network security and learn why investing time and resources in securing your wireless network can help thwart security t... 

  • How to monitor WLAN performance with WIPS

    "Wireless intrusion prevention" -- the very name brings to mind security. But many WIPS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-tuning, and usage planning. This tip explains how to ... 

  • Wireless Security Lunchtime Learning Final Exam

    You've finished Wireless Security Lunchtime Learning, now take this 10-question multiple-choice exam to see how much you've retained. 

  • How to prevent wireless DoS attacks

    Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occur and where they come from, so that you can track th... 

  • Wireless intrusion prevention systems: Overlay vs. embedded sensors

    WIPSes rely on sensors to observe and forward traffic summaries to a central analysis server. Overlay WIPS use special-purpose sensors, dedicated to this monitoring task. Embedded WIPS use APs to monitor the WLAN in their spare time. This tip compare... 

  • Lesson 4 quiz: How to use wireless IPS

    Find out how much you learned in Lesson 4 of Wireless Security Lunchtime Learning. 

  • Rogue AP containment methods

    Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these contai... 

  • Wireless AP placement basics

    Many installers make the mistake of treating 802.11 WLANs just like Ethernet, placing access points (APs) in locations that facilitate outsider access to corporate networks. But, from a security perspective, WLANs should be treated like the Internet ... 

  • See more Essential Knowledge on Wireless LAN Design and Setup
  • evil twin

    In security, an evil twin is a home-made wireless access point (hot spot) that masquerades as a legitimate one to gather personal or corporate information without the end-user's knowledge... (Continued) 

About Wireless LAN Design and Setup

What is wireless LAN? Learn about it here and get tips on how to build and setup WLAN, WLAN design, cards, security, devices and software and standards for Wi-Fi networks.