Wireless LAN Design and Setup

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to block port scan attempts on a public wireless network

    Network security expert Anand Sastry explains how to block port scan attempts on a public wireless network at the host level. 

  • Handheld and mobile device security: Mobile malware, breach prevention

    This mini learning guide offers tips from the experts on how to bulk up your mobile device security policies and techniques in order to protect sensitive corporate data. Our experts define common mobile device security concerns, and identify must-hav... 

  • Securing your wireless network: Preventing wireless security threats

    This mini learning guide helps enterprise information security managers and executives develop a better understanding of wireless network security and learn why investing time and resources in securing your wireless network can help thwart security t... 

  • Wireless network guidelines for PCI DSS compliance

    The PCI Security Standards Council recently released additional guidance for WLANs, but do they make the compliance process easier? Contributor Ben Rothke examines the key points of the new guidelines and offers additional advice for organizations wi... 

  • Savvy VARs should capitalize on wireless LAN security services

    The channel's best bet to profit from WLAN security is in services, ranging from planning and installing secure wireless networks to security and compliance monitoring. 

  • Rogue AP containment methods

    Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these contai... 

  • Lesson 4 quiz: How to use wireless IPS

    Find out how much you learned in Lesson 4 of Wireless Security Lunchtime Learning. 

  • Wireless intrusion prevention systems: Overlay vs. embedded sensors

    WIPSes rely on sensors to observe and forward traffic summaries to a central analysis server. Overlay WIPS use special-purpose sensors, dedicated to this monitoring task. Embedded WIPS use APs to monitor the WLAN in their spare time. This tip compare... 

  • Wireless Security Lunchtime Learning Final Exam

    You've finished Wireless Security Lunchtime Learning, now take this 10-question multiple-choice exam to see how much you've retained. 

  • How to prevent wireless DoS attacks

    Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occur and where they come from, so that you can track th...