TITLE

WIRELESS LAN HOLES

AUTHOR(S)
Fisher, Dennis; Nobel, Carmen
PUB. DATE
February 2001
SOURCE
eWeek;02/12/2001, Vol. 18 Issue 6, p11
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Focuses on the flaws of the security protocol of the wireless local area network called the Wired Equivalency Piracy (WEP) in the United States. Opportunity provided to computer hackers; Concern over the continued manifestation of the oversight in attacks against wireless networks; Efforts of a task force to revise WEP.
ACCESSION #
4089072

 

Related Articles

  • Wireless for the Clueless. Overholt, Alison // Fast Company;Feb2003, Issue 67, p48 

    Presents guidelines for setting up a wireless network that is secure from infiltration by hackers. Growth of wireless networking; Definition of terms in the wireless sector; Advantages from wireless networks; Purpose of the numbers 802.ii in wireless networks; Factors to consider in buying...

  • It's default of the wireless LAN vendors. Henderson, Tom // Network World;7/15/2002, Vol. 19 Issue 28, p40 

    Comments on the security of wireless local area networks (LAN) in the U.S. as of July 15, 2002. Ways in accessing a wireless LAN; Views on the accessibility of wireless LAN; Problems in wireless networks.

  • JUMPSTART FOR WIRELESS OFFERS HIGHEST WLAN SECURITY.  // LAN Product News;Feb2005, pN.PAG 

    This article features JumpStart for Wireless, a way for consumers and small office home office users to install, configure and secure a wireless network, introduced by Atheros Communications Inc. With JumpStart, users can set up full wireless local area network (WLAN) security for a new network...

  • Can rogue wireless LANs be eliminated? No. Boyland, Brian // Network World;1/12/2004, Vol. 21 Issue 2, p41 

    Explains why the computer networking business cannot totally eliminate rogue access points in wireless local area networks (LAN). Failure by the industry to come up with multiple-level security; Possibility to perform radio frequency scanning on weak points that the industry failed to do.

  • the future of WLAN security. Roese, John // Wireless Week;10/21/2002, Vol. 8 Issue 38, p20 

    Discusses wireless local are network security. Way to ensure security around the network; Standards for network security; Description of the Rapid re-Keying technique.

  • GARTNER ADVISES ENTERPRISES ON WLAN SECURITY.  // LAN Product News;Sep2001, p1 

    Discusses findings of the Gartner Inc. survey which showed that majority of enterprises have plans to buy and install wireless local area networks (WLAN) systems. Percentage of enterprises that will suffer serious security exposures from deploying WLAN without implementing the proper security...

  • HOW TO AVOID TROUBLE WHEN SETTING UPA WIRELESS NETWORK. Gastreich, Wallace // Process & Control Engineering (PACE);Mar2006, Vol. 59 Issue 2, p23 

    The article discusses several wireless security problems facing corporate LAN and industrial automation applications. These problems are easy access, rogue access points, unauthorized use of service, service and performance constraints, traffic analysis and eavesdropping and higher level...

  • Check your router.  // Finance Week;Feb/Mar2004 Supplement, p5 

    Focuses on the Wi-Fi Protected Access (WPA) security certification, which is intended to replace the Wired Equivalent Privacy (WEP). Advantages over the WEP; Adoption of WPA by wireless local area network (LAN) vendors; Interoperabiility certifications available from the Wi-Fi Alliance.

  • Products & Services for the Library WLAN. Breeding, Marshall // Library Technology Reports;Sep/Oct2005, Vol. 41 Issue 5, p37 

    The article discusses products and services for the library wireless LAN. One Open Source solution that's become popular for providing hotspots in a library setting is ZoneCD from PublicIP. ZoneCD works in conjunction with the access points of the wireless network to provide additional control...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics