{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

lec8 - CprE 530 Lecture 8 Topics Wireless Security...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
CprE 530 Lecture 8 Topics Wireless Security – Vulnerabilities – Mitigation General Mitigation Methods – VLAN – NAC
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Authentication Based You can set the hardware address Hardware address is used as authentication in Access Points Device authentication – Access point authentication – Wireless device authentication Access point configuration authentication – Gaining access to the access point Access point Authentication Rogue access point – Installed by valid user Fake Access point – Installed by attacker
Background image of page 2