Wireless Security

Wireless Security

M. Belsis (Telecron, Greece), A. Simitsis (National Technical University of Athens, Greece) and S. Gritzalis (University of the Aegean, Greece)
Copyright: © 2007 |Pages: 6
DOI: 10.4018/978-1-59904-002-8.ch172
OnDemand PDF Download:
$37.50

Abstract

The fast growth of wireless technology has exponentially increased the abilities and possibilities of computing equipment. Corporate users can now move around enterprise buildings with their laptops, PDAs, and WiFi; enable VoIP handsets; and retain communications with their offices. Business users can work from almost anywhere by attaching their laptops to WiFi hotspots and connecting to their corporate network. However, not many enterprises know and understand the potential security vulnerabilities that are introduced by the use of WiFi technologies. Wireless technologies are insecure by their nature. Anyone with the appropriate hardware can steal information transmitted using the airwaves. This article discusses the security vulnerabilities that are inherited in wireless networks. Also, it provides a description of the current security trends and protocols used to secure such WiFi networks along with the problems from their application.

Complete Chapter List

Search this Book:
Reset