Wireless intrusion detection

    Date16 Mar 2010
    5764
    Posted ByAlex
    When most people think of wireless, they think only in terms of access and not in terms of attacks or intrusions, say David D. Coleman and David A. Westcott in They emphasise, therefore, on the need to constantly monitor for the many types of attacks because of the potential damage they can cause. Proactive enterprises, however, deploy a WIDS (wireless intrusion detection system) before deploying the wireless network that is meant to provide access.

    Wireless can be an intrusive technology, and if wired data ports at a business are not controlled, any individual (including employees) can install a rogue access point, the author

    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"8","type":"x","order":"1","pct":88.89,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.