IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

WLAN Security Management

WLAN Security Management
View Sample PDF
Author(s): Göran Pulkkis (Arcada Polytechnic Helsinki, Finland), Kaj Grahn (Arcada Polytechnic Helsinki, Finland)and Jonny Karlsson (Arcada Polytechnic Helsinki, Finland)
Copyright: 2008
Pages: 12
Source title: Information Security and Ethics: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Hamid Nemati (The University of North Carolina at Greensboro, USA)
DOI: 10.4018/978-1-59904-937-3.ch091

Purchase

View WLAN Security Management on the publisher's website for pricing and purchasing information.

Abstract

In a wired local-area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data-transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003).

Related Content

Chirag Sharma, Amanpreet Kaur, Priyanka Datta, Yonis Gulzar. © 2025. 30 pages.
M. Johnpaul, Raam Sai Bharadwaj Miryala, Marica Mazurek, G. Jayaprakashnarayana, Ramesh Kumar Miryala. © 2025. 28 pages.
Jatin Arora, Gaganpreet Kaur, Monika Sethi, Saravjeet Singh. © 2025. 20 pages.
L. A. Anto Gracious, L. Sudha, B. Chitra, Gaganpreet Kaur, V. Sathya, P. Kabitha, R. Siva Subramanian. © 2025. 28 pages.
Bhavik Singla, Anuj Kumar Jain, Gaganpreet Kaur, Nitin Jain, Vishal Jain. © 2025. 28 pages.
P. Vijayalakshmi, K. Subashini, B. Selvalakshmi, G. Sudhakar, Anand Anbalagan, N. Bharathiraja, Gaganpreet Kaur. © 2025. 22 pages.
Djamel Saba, Abdelkader Hadidi. © 2025. 28 pages.
Body Bottom