ISSC262: Wireless Vulnerabilities

Description

Considering that there are many security concerns surrounding wireless networks, and many tools are freely available, how does and administrator or even an individual user go about ensuring the security of their wireless network? List a minimum of two methods/techniques, and explain the rationale for your decision?

Don't use plagiarized sources. Get Your Custom Assignment on
ISSC262: Wireless Vulnerabilities
From as Little as $13/Page