ALL >> Computers >> View Article
Guidelines For Increasing Wireless Security Through Network Topology
Where wireless access points are placed on the LAN is important. You do have CompTIA A+ Practical Application(http://www.aplus-220-701.com)
choices. Should you firewall the AP? Follow these guidelines to increase wireless security:
Carefully select and correctly position the antenna to limit the exposure of wireless networks. When you do this, better coverage and access is provided
for authorized users, and intruders have less chance of obtaining access to the network. Directional antennas and low transmitter power can eliminate some of the wireless leakage (wireless access from outside your facility). Connect the wireless access point to a switch instead of a hub.
A switch does not broadcast all data to all its nodes, thus a wireless client can not easily sniff wired network traffic on the network connected to a switch.
Think of wireless access points as untrusted networks.They are. Use firewalls and VPNs to protect access to your networks from the
access point.This standard uses a key management protocol that provides keys automatically and can change them rapidly at set intervals.
...
... A wireless honeypot generates thousands of counterfeit 802.lib access points. You can hide the real wireless network among this plethora of beacon frames. This will confuse attackers. While it might only be a temporary setback to a determined attacker, it can cause a large number of less sophisticated or less determined attackers to look elsewhere to indulge their curiosity or to obtain free Internet access. You might also be able to monitor connection attempts and know when you are under sustained attack. You can find infor?mation about a commercial wireless honeypot at
A+ Exams(http://www.aplus-220-701.com)
.
Security Chief "My job is to protect the museum exhibits. We have good physical security, but it could be better. I have proposed smart badges. These badges will provide our staff with entrance into the building and into the private areas of the museum. I can even locate staff members by these badges if need be. More importantly, we can then implement tighter physical security at all museum entrances, back rooms, storage areas, and offices. Secondly, I want to tag every exhibit item and know if any are moved from free CompTIA practice questions(http://www.examshots.com/vendor/CompTIA-4.html)
where they are supposed to be."
Add Comment
Computers Articles
1. What Identity Governance Really Means In Modern EnterprisesAuthor: Mansoor Alam
2. Strategies For Successful Site Selection In Clinical Trials
Author: Giselle Bates
3. Simplifying Business Purchases With Smart, Reliable Procurement Solutions
Author: suma
4. How Businesses In Dubai Are Scaling Faster With Modern Erp Software
Author: Al murooj solutions
5. How To Choose The Right Weapon Tracking System: 7 Must-have Features
Author: 3PL Insights
6. Power Bi Tutorial For Beginners: Learn Business Intelligence Step By Step
Author: Tech Point
7. Spark Matrix™: Data Governance Solutions
Author: Umangp
8. How Prediction Market Software Development Is Transforming Data-driven Decision Making
Author: david
9. Naming Development & Management
Author: brainbell10
10. Mysql Database Development & Management Services
Author: brainbell10
11. Mongodb Development & Management
Author: brainbell10
12. Spark Matrix™: Conversational Automation
Author: Umangp
13. How Care Home Software Helps Improve Daily Operations In Care Homes
Author: Centrim Life UK
14. Pc & Tech Stores: Latest Trends In Hardware And Accessories
Author: Jack Williams
15. The Infozed Blueprint: Powering The Modern Workspace
Author: suma






