Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures
Nwabude
Arinze Sunday - 34 -Completion of this process provides a prioritized list of at-risk assets. Base on this, a security policy that defends important assets from wireless-borne attack, balancing cost/benefit and residual risk can be written.
Next step is to select, install, and configure countermeasures that implement and enforce the security policy.
Share with your friends: