Cyber Security Expo
Wireless Attacks by Dan Schade on 07/06/06

As more and more home and business users adapt wireless technologies because of their ease of use and affordability, these devices are coming under attack by the malicious who are after your data and by the casual user looking for free bandwidth. In this paper, I will explain how wireless attacks are done on Wired Equivalency Privacy (WEP) networks, other common network attacks and then present several options to defend wireless networks.

This document is in PDF format. To view it click here.

Rate this article

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , All rights reserved. Comments are property of the respective posters.