TITLE

the future of WLAN security

AUTHOR(S)
Roese, John
PUB. DATE
October 2002
SOURCE
Wireless Week;10/21/2002, Vol. 8 Issue 38, p20
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Discusses wireless local are network security. Way to ensure security around the network; Standards for network security; Description of the Rapid re-Keying technique.
ACCESSION #
7593735

 

Related Articles

  • concerns don't hurt Wi-Fi popularity. Albright, Peggy // Wireless Week;6/3/2002, Vol. 8 Issue 22, p34 

    Discusses security concerns over the use of the 802.11 wireless local network technology in the U.S. Benefits of wireless local area network technologies; Information on the encryption mechanism of the technology known as Wired Equivalent Privacy; Implications of the growing popularity of the...

  • eFiles.  // eWeek;8/27/2001, Vol. 18 Issue 33, p35 

    Reports developments related to wireless technology. Tribulations on serious security exposures from deployed wireless local area networks (WLAN); Set-up of security standards for WLAN; Increase on production of wireless or mobile computing devices.

  • New keys to network security. Schwartau, Winn // InfoWorld;5/15/95, Vol. 17 Issue 20, p51 

    Discusses different ways to improve local area network security. Use of identification (ID) cards; SecurID system; Software-token-based challenge-response system; Fingerprint or retinal scan; Use of pass phrases; Voice-identification system.

  • MAKING WIRELESS LAN SECURITY AIR TIGHT. Messmer, Ellen; Cox, John // Network World;12/2/2002, Vol. 19 Issue 48, p55 

    Reports that companies and organizations are using security gateways to enhance the security of their wireless local area networks (LAN). Cambridge, Massachusetts-based Harvard Medical School's adoption of the Bluesocket Wireless Gateway and Cisco Aironet wireless access points; Use of...

  • Network Problems Avoided By Attention to Security. Huffer, John // San Diego Business Journal;1/28/2002, Vol. 23 Issue 4, p24 

    Presents issues on the Local Area Network problems among company personnel's computers in San Diego, California. Emphasis of a Local Area Network; Presentation of issues from network administrators; Problems and preventions on computer network.

  • Start-up comes to the defense of wireless LAN users. Cox, John // Network World;6/3/2002, Vol. 19 Issue 22, p18 

    Reports the development of an approach to wireless local area network security by AirDefense in Georgia. Details on the technology design; Use of a distributed radio-based sensors in the system; Advantage of the centralized security strategy.

  • WIRELESS LAN HOLES. Fisher, Dennis; Nobel, Carmen // eWeek;02/12/2001, Vol. 18 Issue 6, p11 

    Focuses on the flaws of the security protocol of the wireless local area network called the Wired Equivalency Piracy (WEP) in the United States. Opportunity provided to computer hackers; Concern over the continued manifestation of the oversight in attacks against wireless networks; Efforts of a...

  • Local area network operations: a security, control and audit perspective. Jamieson, Rodger; Low, Graham // Journal of Information Technology (Routledge, Ltd.);Jun90, Vol. 5 Issue 2, p63 

    This paper provides a framework for the review of security and control within a local area network environment. Network operations are subdivided into several functional areas or components for further review. Each component or area is briefly explained and the security risks, issues and...

  • Another study finds WLAN vulnerabilities. Albright, Brian // Frontline Solutions;Jun2001, Vol. 2 Issue 6 

    Identifies the dangers of security breach facing wireless local area networks (WLAN). Companies susceptible to WLAN security breaches; Flaws in the Wired Equivalency Privacy feature affecting WLAN security.

  • Wireless for the Clueless. Overholt, Alison // Fast Company;Feb2003, Issue 67, p48 

    Presents guidelines for setting up a wireless network that is secure from infiltration by hackers. Growth of wireless networking; Definition of terms in the wireless sector; Advantages from wireless networks; Purpose of the numbers 802.ii in wireless networks; Factors to consider in buying...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics