Corporate network administrators are not the only ones
who are, or should be, concerned about the rogue AP
problem. Universities’ support staffs are already having a
difficult time trying to manage the security of the PCs on the
network. Under pressure from students, staff, and
administration, the universities’ networking staffs have
deployed wireless networking across campus with minimum
security measures. Some enable the wired equivalency
protocol (WEP) and perform some degree of applicationlevel
authentication before allowing nodes to become
associated with the network. While this is a good start, due to
various factors, including cost constraints, many universities
do not have specific wireless intrusion detection systems, nor
do they have any method of preventing students, staff, or
faculty from installing their own AP. This rogue AP may
allow unauthorized pleasant or malicious users onto the
network. Further, the network administrator will have
difficulty tracking down the assailant.
Corporate network administrators are not the only ones
who are, or should be, concerned about the rogue AP
problem. Universities’ support staffs are already having a
difficult time trying to manage the security of the PCs on the
network. Under pressure from students, staff, and
administration, the universities’ networking staffs have
deployed wireless networking across campus with minimum
security measures. Some enable the wired equivalency
protocol (WEP) and perform some degree of applicationlevel
authentication before allowing nodes to become
associated with the network. While this is a good start, due to
various factors, including cost constraints, many universities
do not have specific wireless intrusion detection systems, nor
do they have any method of preventing students, staff, or
faculty from installing their own AP. This rogue AP may
allow unauthorized pleasant or malicious users onto the
network. Further, the network administrator will have
difficulty tracking down the assailant.
การแปล กรุณารอสักครู่..