Wireless networking has seen tremendous growth and widespread business adoption in the past decade.
In fact, commodity 802.11 devices have become nearly ubiquitous today, emerging as an easy, convenient solution that can already exceed megabit Ethernet speeds [1- 3].
The installation of a wireless access point requires only basic skills (and sometimes only the push of a button [4]), allowing any innocent employee to easily attach it to a wired corporate network.
In doing so, the user inadvertently bypasses the inherent physical end point security of the wired network, possibly subverting careful access control policies like WPA2 for easily spoofed MAC filtering [5, 6]
Wireless networking has seen tremendous growth and widespread business adoption in the past decade. In fact, commodity 802.11 devices have become nearly ubiquitous today, emerging as an easy, convenient solution that can already exceed megabit Ethernet speeds [1- 3]. The installation of a wireless access point requires only basic skills (and sometimes only the push of a button [4]), allowing any innocent employee to easily attach it to a wired corporate network. In doing so, the user inadvertently bypasses the inherent physical end point security of the wired network, possibly subverting careful access control policies like WPA2 for easily spoofed MAC filtering [5, 6]
การแปล กรุณารอสักครู่..