Start-up comes to the defense of wireless LAN users

Cox, John
June 2002
Network World;6/3/2002, Vol. 19 Issue 22, p18
Trade Publication
Reports the development of an approach to wireless local area network security by AirDefense in Georgia. Details on the technology design; Use of a distributed radio-based sensors in the system; Advantage of the centralized security strategy.


Related Articles

  • New keys to network security. Schwartau, Winn // InfoWorld;5/15/95, Vol. 17 Issue 20, p51 

    Discusses different ways to improve local area network security. Use of identification (ID) cards; SecurID system; Software-token-based challenge-response system; Fingerprint or retinal scan; Use of pass phrases; Voice-identification system.

  • MAKING WIRELESS LAN SECURITY AIR TIGHT. Messmer, Ellen; Cox, John // Network World;12/2/2002, Vol. 19 Issue 48, p55 

    Reports that companies and organizations are using security gateways to enhance the security of their wireless local area networks (LAN). Cambridge, Massachusetts-based Harvard Medical School's adoption of the Bluesocket Wireless Gateway and Cisco Aironet wireless access points; Use of...

  • Network Problems Avoided By Attention to Security. Huffer, John // San Diego Business Journal;1/28/2002, Vol. 23 Issue 4, p24 

    Presents issues on the Local Area Network problems among company personnel's computers in San Diego, California. Emphasis of a Local Area Network; Presentation of issues from network administrators; Problems and preventions on computer network.

  • WIRELESS LAN HOLES. Fisher, Dennis; Nobel, Carmen // eWeek;02/12/2001, Vol. 18 Issue 6, p11 

    Focuses on the flaws of the security protocol of the wireless local area network called the Wired Equivalency Piracy (WEP) in the United States. Opportunity provided to computer hackers; Concern over the continued manifestation of the oversight in attacks against wireless networks; Efforts of a...

  • Local area network operations: a security, control and audit perspective. Jamieson, Rodger; Low, Graham // Journal of Information Technology (Routledge, Ltd.);Jun90, Vol. 5 Issue 2, p63 

    This paper provides a framework for the review of security and control within a local area network environment. Network operations are subdivided into several functional areas or components for further review. Each component or area is briefly explained and the security risks, issues and...

  • Another study finds WLAN vulnerabilities. Albright, Brian // Frontline Solutions;Jun2001, Vol. 2 Issue 6 

    Identifies the dangers of security breach facing wireless local area networks (WLAN). Companies susceptible to WLAN security breaches; Flaws in the Wired Equivalency Privacy feature affecting WLAN security.

  • Wireless for the Clueless. Overholt, Alison // Fast Company;Feb2003, Issue 67, p48 

    Presents guidelines for setting up a wireless network that is secure from infiltration by hackers. Growth of wireless networking; Definition of terms in the wireless sector; Advantages from wireless networks; Purpose of the numbers 802.ii in wireless networks; Factors to consider in buying...

  • Cautious users cast wary eye on WLANS. Greene, Tim // Network World;6/23/2003, Vol. 20 Issue 25, p17 

    Reports on the conclusion of a panel of corporate information technology (IT) executives about the attitude of potential users to wireless local area networks (LAN). Perceived shortcomings of wireless LANs; Security, management of wireless spectrum in urban areas and hospitals and the...

  • It's default of the wireless LAN vendors. Henderson, Tom // Network World;7/15/2002, Vol. 19 Issue 28, p40 

    Comments on the security of wireless local area networks (LAN) in the U.S. as of July 15, 2002. Ways in accessing a wireless LAN; Views on the accessibility of wireless LAN; Problems in wireless networks.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics