Вы находитесь на странице: 1из 4

_______________________________________________________________

_______________________________________________________________

Report Information from ProQuest


02 October 2013 18:41 _______________________________________________________________

02 October 2013

ProQuest

Table of contents
1. Cracking the wireless security code............................................................................................................. 1

02 October 2013

ii

ProQuest

Document 1 of 1

Cracking the wireless security code


Author: Snyder, Joel; Thayer, Rodney Publication info: Network World 21.40 (Oct 4, 2004): 1. ProQuest document link Abstract: A question on the possibility of deploying a secure wireless LAN with technology today preys on the minds of IT executives who are tempt to deploy enterprise WLANs, but are hesitant because of security concerns. Twenty-three wireless products from 17 vendors were assembled and ran through a battery of tests aimed at getting the answer. Ultimately, 802.11i, the standard that replaces Wire Equivalent Privacy and Wi-Fi Protected Access, will provide all the tools needed to protect WLANs. To their credit, vendors are aggressively shipping products at all prices that support enterprise-class security features. Full text: Headnote CLEAR CHOICE SPECIAL REPORT

Is possible to deploy a secure wireless LAN with technology available today? That question preys on the minds of IT executives who are tempted to deploy enterprise WLANs, but are hesitant because of security concerns. So we assembled 23 wireless products from 17 vendors and ran them through a battery of tests aimed at getting the answer. We found that Wired Equivalent Privacy (WEP) is very weak, and we don't recommend using it other than in very specialized cases. WEP's successor,Wi-Fi Protected Access (WPA), has flaws but provides solid security when combined with 802.1X authentication and deployed carefully Ultimately, 802.11i, the standard that replaces WEP and WPA, will provide all the tools needed to protect WLANs. 02 October 2013 Page 1 of 2 ProQuest

To their credit, vendors are aggressively shipping products at all prices that support enterprise-class security features.Two-thirds of the products tested support 802.1X, and vendors are moving rapidly to comply with 802.11i standards. AuthorAffiliation BY JOEL SNYDER AND RODNEY THAYER, NETWORK WORLD LAB ALLIANCE Subject: Product testing; Manyproducts; Local area networks; Network security; Network adapters; Wireless access points; Network switching; Location: United States--US Classification: 7500: Product planning & development; 9190: United States; 8650: Electrical & electronics industries Publication title: Network World Volume: 21 Issue: 40 Pages: 1 Number of pages: 1 Publication year: 2004 Publication date: Oct 4, 2004 Year: 2004 Publisher: Network World Inc. Place of publication: Southborough Country of publication: United States Publication subject: Communications--Computer Applications ISSN: 08877661 Source type: Trade Journals Language of publication: English Document type: Cover Story Document feature: Tables Illustrations ProQuest document ID: 215975467 Document URL: http://search.proquest.com/docview/215975467?accountid=32506 Copyright: Copyright Network World Inc. Oct 4, 2004 Last updated: 2010-06-09 Database: ProQuest Research Library

_______________________________________________________________
Contact ProQuest

Copyright 2013 ProQuest LLC. All rights reserved. - Terms and Conditions

02 October 2013

Page 2 of 2

ProQuest

Вам также может понравиться