With the convenience of wireless technologies comes a new host of security problems. Unlike a wired network?where security involves limiting physical access to routers, hubs, and cables?a wireless network's most vulnerable point (the radio waves beaming through the air) has no physical substance. This makes security a challenging task.
In this book, we will take a look at the various ways to secure wireless networks, using standards such as Wired Equivalent Privacy (WEP), 802.1x, and 802.11i. We will also look at the security features found in the Bluetooth and Infrared technologies. Chapter 5 discusses how to communicate securely.