Summary

This chapter looked at authentication mechanisms and the WEP method. Chapter 6 looks into the vulnerabilities of wireless networks.