Tech Tutorials Database
GeekArticles XML Wireless
 

Article :: Wireless Security and Privacy: Identify Targets and Roles

 
Author: awprofessional.com
Category: Wireless
Comments (0)

Follow this plan to break down your wireless system into functional blocks, then determine which resources or data require protection. After identifying possible security targets, you determine the roles that affect the targets. With the roles and targets identified, you'll be ready to mitigate and protect your system.

Read More...




Sponsored Links




Read Next: Article :: Unwitting Collaborators, Part 6: Wireless Insecurity



 

 

Comments