Evaluating Wireless Networks. Robert W. Cobb and Staff National Aeronautics and Space Administration IT Roundtable 25 March 2003. Outline. Introduction to wireless networks Threats and vulnerabilities Evaluating wireless networks Objectives Methodology Tools Findings
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Robert W. Cobb
National Aeronautics and Space Administration
25 March 2003
Example: Many wireless networks do not use WEP or other encryption to protect network traffic.
▲ = Access points using
▲ = Access points without
Example: The radio signal from a wireless network can spill over from the building where access points are located to neighboring buildings, parking lots and public roads.