In such an environment, wireless network security is becoming more important every day. While each connection with a client, a supplier or a enterprise partner can improve responsiveness and efficiency, it also increases the vulnerability of enterprise wireless data to attack. Furthermore, as enterprises strive to provide better availability of mission-critical wireless data, they also face the challenge of maintaining that data's security and integrity. Thus, wireless networks require secure access to the AP and the ability to isolate the AP from the internal private network prior to user authentication into the network domain. In contrast, a wireless access point (AP) may be accessed from off the premises if the signal is detectable (for instance, from a parking lot adjacent to the building). A user must gain physical access to the building in order to plug a client computer into a network jack. Existing wired network jacks are located inside buildings already secured from unauthorized access through the use of keys, badge access, and so forth. An important aspect of this is the need to provide secure access to the network for valid users. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. INTRODUCTION With the increasing deployment of wireless networks (802.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |