Read this whole guide offline with no ads, for a low price!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

Need more practice? 300 additional Security+ questions!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Security+
 9  Chapter 2:  Communication Security (Domain 2.0; 20%)

Previous Topic/Section
2.5.4.1  Packet Sniffing
Previous Page
Pages in Current Topic/Section
1
Next Page
2.6.1  WTLS
Next Topic/Section

2.6  Wireless

For the most part, humans have a tendency to not believe something unless they can directly observe it with one of the five senses. Frequently, even when presented with evidence, humans have a way of denying the data. It took the medical society a long time to believe Anton Van Leeuwenhoek when he discovered life that could not be seen without his new invention, the microscope.

Similarly radio waves cannot be directly observed without equipment. This fact alone makes data sent by this means a difficult risk to manage. Compound the issue with the realization that radio waves can glide through walls and glass like it wasn’t there and you have the recipe for a security risk that at first seems impossible. Fortunately, radio is not a new technology and its behaviors are well known. Keep in mind wireless networking is not the only issue231. Continue on and discover how you can use wireless technology to your benefit and minimize the security risks.

Think of throwing a stone into a still pond. At the point of impact, the waves travel outward in a circle decreasing in strength, as it gets larger. If the wave of water does not hit an object, it eventually disappears. If it does hit an object, such as a large stone in the water, the wave action bounces back. Radio waves behave in a quite similar fashion. The difference is since a radio wave is electromagnetic; metal is used.

Quick navigation to subsections and regular topics in this section



 __________________

231. http://www.aftenposten.no/english/local/article.jhtml?articleID=431326

Previous Topic/Section
2.5.4.1  Packet Sniffing
Previous Page
Pages in Current Topic/Section
1
Next Page
2.6.1  WTLS
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004

Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.