Evaluating Wireless Networks. Robert W. Cobb and Staff National Aeronautics and Space Administration IT Roundtable 25 March 2003. Outline. Introduction to wireless networks Threats and vulnerabilities Evaluating wireless networks Objectives Methodology Tools Findings
Robert W. Cobb
National Aeronautics and Space Administration
25 March 2003
Example: Many wireless networks do not use WEP or other encryption to protect network traffic.
▲ = Access points using
▲ = Access points without
Example: The radio signal from a wireless network can spill over from the building where access points are located to neighboring buildings, parking lots and public roads.