TITLE

Cyber Report Singles Out Wi-Fi

AUTHOR(S)
Rockwell, Mark
PUB. DATE
September 2002
SOURCE
Wireless Week;9/23/2002, Vol. 8 Issue 34, p1
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on the report issued by the Critical Infrastructure Protection Board on the security risks of wireless local area networks (WLAN). Advice to WLAN vendors to improve their security; Remarks of industry analysts on the report.
ACCESSION #
7458085

 

Related Articles

  • Don't Let Digital Hobos Camp on Your Wireless Network. Brandt, Andrew // PCWorld;Nov2002, Vol. 20 Issue 11, p48 

    Focuses on the computer security in the wireless network in the U.S. Definition of war chalking trend by mobile hackers on modem-connected numbers; Number of wireless access points without or limited security; Features of Wired Equivalent Privacy on the network default settings.

  • Something in the air. Kranzl, Justin // Bulletin with Newsweek;1/22/2002, Vol. 120 Issue 6308, p56 

    Analyzes the risk of security in the increasing use of wireless networking technology. Benefits of wireless communication; Rate of growth of technology from mid-2000 to January 2002; Consequences of security breach; Plans of security consultants for wireless networking technology .

  • THE AGE OF ÃœBER-SECURITY. Abbattista, Anthony // Telephony;4/22/2002, Vol. 242 Issue 16, p40 

    Presents answers to queries on computer security issues in wireless communication. Aspects to consider in data protection; Security measures to be implemented; Threat posed by telecommuters.

  • Getting Vertical. Brown, Bob // Network World;7/7/2003, Vol. 20 Issue 27, p30 

    Editorial. Explores the issues associated with industry-specific technology advances. Network security; Wireless technology; Money issues.

  • PC developers worry about security. Ames, Benjamin B. // Design News;8/19/2002, Vol. 58 Issue 16, p29 

    Deals with the results of a survey among the attendees at PC Expo in June 2002, about the concerns of technology companies. Value given to computer security; Implications of the declined interest in extending the life of existing applications; Concerns with wireless technology.

  • Semantic search and interaction. Lim, Sukhyun // Multimedia Tools & Applications;Jul2014, Vol. 71 Issue 2, p623 

    Several reports published within the issue are presented including on cost effective data wiping methods for mobile phone, practical firewall policy inspection and android application which gives information on the foot and mouth disease in Korea

  • Lock Out Internet Pests, Lock In Network Security. Spanbauer, Scott // PCWorld;Nov2002, Vol. 20 Issue 11, p164 

    Focuses on computer network security. Advantages of wireless networking on computer security; Vulnerability of the open 802.11a wireless protocol on hijacking of online identity; Fine-tuning of Windows installation. INSET: SpamNet: The Napster of Outlook Spam Blocking.

  • CAFES SERVE UP DRINKS, CAKES AND INTERNET ACCESS TO GO. Rombel, Adam // Global Finance;Oct2002, Vol. 16 Issue 10, p12 

    Reports on innovations in Starbucks Coffee Co. Wireless Internet access in cafes across the U.S.; Launch of T-Mobile HotSpot; Computer security issues; Security measures and standards for wireless fidelity compatible devices.

  • Aruba 800 Mobility Controller.  // SC Magazine: For IT Security Professionals (UK Edition);Dec2007, p55 

    The article evaluates the Aruba 800 Mobility Controller.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics