Tech Tutorials Database
GeekArticles XML Wireless

Article :: Wireless Security and Privacy: Identify Targets and Roles

Category: Wireless
Comments (0)

Follow this plan to break down your wireless system into functional blocks, then determine which resources or data require protection. After identifying possible security targets, you determine the roles that affect the targets. With the roles and targets identified, you'll be ready to mitigate and protect your system.


Sponsored Links

Read Next: Article :: Unwitting Collaborators, Part 6: Wireless Insecurity