![]() ![]() ![]() A wireless access point plugged into your network will typically have an Ethernet connection tied into some part of your LAN, and provide wireless access to an attacker that bridges the connections. The problem is that it is very easy for a user to establish a rogue wireless access point either inadvertently or deliberately. It is important to ensure that all wireless networks are established and configured in compliance with the organization’s policies and standards for wireless networks. Detecting and preventing rogue wireless access points is a major concern for many organizations. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |