Another study finds WLAN vulnerabilities

Albright, Brian
June 2001
Frontline Solutions;Jun2001, Vol. 2 Issue 6
Identifies the dangers of security breach facing wireless local area networks (WLAN). Companies susceptible to WLAN security breaches; Flaws in the Wired Equivalency Privacy feature affecting WLAN security.


Related Articles

  • Intel rolls out enterprise LAN access with security cards. Jacobs, April // Network World;09/18/2000, Vol. 17 Issue 38, p12 

    Reports on Intel's introduction of secure local area network (LAN) adapter security cards in September 2000. Goal of helping customers inexpensively provide data security across their networks; Coprocessor of the Pro/100 S family of security cards that handles all encryption and decryption...

  • Juniper scores with WLAN protector.  // Network World;3/7/2005, Vol. 22 Issue 9, p1 

    This article features Juniper's NetScreen-5GT Wireless firewall for the computer industry in the U.S. The product is found to be a clean melding of a trusted, full-featured firewall to a secure wireless access point, and is targeted at the small and midsize business and remote site markets....

  • Caterpillar LAN Hack: A Lesson in Security. Kerstetter, Jim // PC Week;10/19/98, Vol. 15 Issue 42, p1 

    Reports that a computer hacker was able to access the local area network (LAN) of Caterpillar Inc. in September of 1998. The use of an outdated administration account that was not deleted; How poor password protection on the LAN helped the hacker; Efforts to determine who the hacker is and...

  • AirDefense counterattacks WLAN threats. Cox, John // Network World;11/8/2004, Vol. 21 Issue 45, p10 

    This article reports that AirDefense has launched AirDefense Enterprise 6.0, system software for protecting wireless local area networks (WLANs). Features include: software agent to protect WLAN clients from viruses and other threats; threat index to identify a rogue device as a low to high...

  • Helpful tips to keep business computers safe from hackers. Freudenberg, Paul // Business Journal Serving Fresno & the Central San Joaquin Valley;01/19/98, Issue 322253, p23 

    Opinion. Offers insights on preventing hackers from intruding into the confidential data stored in computers of business enterprises. Use of firewalls; Use of cryptic phrases that combine uppercase and lowercase letters as passwords; Inclusion of add-on encryption schemes to computers.

  • Businesses ignore computer security.  // Internal Auditor;Jun96, Vol. 53 Issue 3, p11 

    Reports that organizations in North America and Europe are neglecting computer security. Ignorance of British finance directors about computer security issues; Computer-related theft in Great Britain; Other findings in a KPMG survey of senior-level finance executives.

  • Computer security: It's best to lock it, pocket the key. Ellingson, Dave // Las Vegas Business Press;2/27/95, Vol. 12 Issue 8, p18 

    Discusses how managers can ensure computer security. Netscape's installation of security measures to protect transmission of credit card numbers; Proposed legislation on computer security.

  • You're a what? Data security analyst. Mariani, Matthew // Occupational Outlook Quarterly;Summer94, Vol. 38 Issue 2, p39 

    Describes the job of a data security analyst using Jamie Jeffers of Fannie Mae as an example. How the data security analyst acts as a data detective; Protecting computer data systems from having information stolen or altered without permission; Jamie's background with computers.

  • Before disaster strikes: 12 steps to minimize computer losses. Storkman, Wayne D. // Outlook;Spring94, Vol. 62 Issue 1, 4th Annual Computer... p10 

    Offers steps to minimize computer system failure or data loss related to a disaster. Performing regular and complete backups; Practicing restoring from backups; Documenting backup procedures; Storing backups off-site or out of state; Prearranging alternative computer facilities and...

  • Computer system buddies. McCready, Donald C. // Ohio CPA Journal;Dec94, Vol. 53 Issue 6, p47 

    Discusses several preventive measures in using computers. Backup devices; Uninterruptible power supply; Diagnostic utilities; Virus protection software; Environmental control equipment; Complementary metal oxide semiconductor (CMOS) printout.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics