TITLE

Another study finds WLAN vulnerabilities

AUTHOR(S)
Albright, Brian
PUB. DATE
June 2001
SOURCE
Frontline Solutions;Jun2001, Vol. 2 Issue 6
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Identifies the dangers of security breach facing wireless local area networks (WLAN). Companies susceptible to WLAN security breaches; Flaws in the Wired Equivalency Privacy feature affecting WLAN security.
ACCESSION #
4613302

 

Related Articles

  • Intel rolls out enterprise LAN access with security cards. Jacobs, April // Network World;09/18/2000, Vol. 17 Issue 38, p12 

    Reports on Intel's introduction of secure local area network (LAN) adapter security cards in September 2000. Goal of helping customers inexpensively provide data security across their networks; Coprocessor of the Pro/100 S family of security cards that handles all encryption and decryption...

  • Juniper scores with WLAN protector.  // Network World;3/7/2005, Vol. 22 Issue 9, p1 

    This article features Juniper's NetScreen-5GT Wireless firewall for the computer industry in the U.S. The product is found to be a clean melding of a trusted, full-featured firewall to a secure wireless access point, and is targeted at the small and midsize business and remote site markets....

  • Caterpillar LAN Hack: A Lesson in Security. Kerstetter, Jim // PC Week;10/19/98, Vol. 15 Issue 42, p1 

    Reports that a computer hacker was able to access the local area network (LAN) of Caterpillar Inc. in September of 1998. The use of an outdated administration account that was not deleted; How poor password protection on the LAN helped the hacker; Efforts to determine who the hacker is and...

  • AirDefense counterattacks WLAN threats. Cox, John // Network World;11/8/2004, Vol. 21 Issue 45, p10 

    This article reports that AirDefense has launched AirDefense Enterprise 6.0, system software for protecting wireless local area networks (WLANs). Features include: software agent to protect WLAN clients from viruses and other threats; threat index to identify a rogue device as a low to high...

  • Helpful tips to keep business computers safe from hackers. Freudenberg, Paul // Business Journal Serving Fresno & the Central San Joaquin Valley;01/19/98, Issue 322253, p23 

    Opinion. Offers insights on preventing hackers from intruding into the confidential data stored in computers of business enterprises. Use of firewalls; Use of cryptic phrases that combine uppercase and lowercase letters as passwords; Inclusion of add-on encryption schemes to computers.

  • Businesses ignore computer security.  // Internal Auditor;Jun96, Vol. 53 Issue 3, p11 

    Reports that organizations in North America and Europe are neglecting computer security. Ignorance of British finance directors about computer security issues; Computer-related theft in Great Britain; Other findings in a KPMG survey of senior-level finance executives.

  • Computer security: It's best to lock it, pocket the key. Ellingson, Dave // Las Vegas Business Press;2/27/95, Vol. 12 Issue 8, p18 

    Discusses how managers can ensure computer security. Netscape's installation of security measures to protect transmission of credit card numbers; Proposed legislation on computer security.

  • You're a what? Data security analyst. Mariani, Matthew // Occupational Outlook Quarterly;Summer94, Vol. 38 Issue 2, p39 

    Describes the job of a data security analyst using Jamie Jeffers of Fannie Mae as an example. How the data security analyst acts as a data detective; Protecting computer data systems from having information stolen or altered without permission; Jamie's background with computers.

  • Before disaster strikes: 12 steps to minimize computer losses. Storkman, Wayne D. // Outlook;Spring94, Vol. 62 Issue 1, 4th Annual Computer... p10 

    Offers steps to minimize computer system failure or data loss related to a disaster. Performing regular and complete backups; Practicing restoring from backups; Documenting backup procedures; Storing backups off-site or out of state; Prearranging alternative computer facilities and...

  • Computer system buddies. McCready, Donald C. // Ohio CPA Journal;Dec94, Vol. 53 Issue 6, p47 

    Discusses several preventive measures in using computers. Backup devices; Uninterruptible power supply; Diagnostic utilities; Virus protection software; Environmental control equipment; Complementary metal oxide semiconductor (CMOS) printout.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics