Wireless Local Area Network (WLAN): Security Risk Assessment
and Countermeasures Nwabude
Arinze Sunday - 33 - possible attacks. Ongoing monitoring and periodic testing can then be used to verify that a deployed WLAN meets defined objectives. Vulnerabilities discovered in the process are then (reanalyzed so as to refine the policies and/or apply fixes. This iterative process is illustrated in the diagram (figure 9) shown below.
Share with your friends: