123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Guidelines For Increasing Wireless Security Through Network Topology

Profile Picture
By Author: unknownmem
Total Articles: 128
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Where wireless access points are placed on the LAN is important. You do have CompTIA A+ Practical Application(http://www.aplus-220-701.com)
choices. Should you firewall the AP? Follow these guidelines to increase wireless security:
Carefully select and correctly position the antenna to limit the exposure of wireless networks. When you do this, better coverage and access is provided
for authorized users, and intruders have less chance of obtaining access to the network. Directional antennas and low transmitter power can eliminate some of the wireless leakage (wireless access from outside your facility). Connect the wireless access point to a switch instead of a hub.
A switch does not broadcast all data to all its nodes, thus a wireless client can not easily sniff wired network traffic on the network connected to a switch.
Think of wireless access points as untrusted networks.They are. Use firewalls and VPNs to protect access to your networks from the
access point.This standard uses a key management protocol that provides keys automatically and can change them rapidly at set intervals.
...
... A wireless honeypot generates thousands of counterfeit 802.lib access points. You can hide the real wireless network among this plethora of beacon frames. This will confuse attackers. While it might only be a temporary setback to a determined attacker, it can cause a large number of less sophisticated or less determined attackers to look elsewhere to indulge their curiosity or to obtain free Internet access. You might also be able to monitor connection attempts and know when you are under sustained attack. You can find infor?mation about a commercial wireless honeypot at
A+ Exams(http://www.aplus-220-701.com)
.
Security Chief "My job is to protect the museum exhibits. We have good physical security, but it could be better. I have proposed smart badges. These badges will provide our staff with entrance into the building and into the private areas of the museum. I can even locate staff members by these badges if need be. More importantly, we can then implement tighter physical security at all museum entrances, back rooms, storage areas, and offices. Secondly, I want to tag every exhibit item and know if any are moved from free CompTIA practice questions(http://www.examshots.com/vendor/CompTIA-4.html)
where they are supposed to be."

Total Views: 263Word Count: 360See All articles From Author

Add Comment

Computers Articles

1. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

4. The Rise Of User Centered Web Design
Author: goodcoders

5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech

12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech

13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech

14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech

15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: