Abstract :
I examine technology for addressing the numerous security concerns raised in the first article. Unhappily, there are few easy answers-WLANs are still inherently insecure. However, more choices are now available to manage WLAN security. Key to understanding these choices are security deployment architectures, the technologies they rely on, and effective security management.
Keywords :
computer network management; risk management; security of data; telecommunication security; wireless LAN; security deployment architectures; security management; wireless LAN security; Access control; Communication system security; Lifting equipment; Local area networks; Plugs; Portable computers; Protection; Switches; Wireless LAN; Wireless networks;