O'Reilly logo

Wireless Security: Know It All by Jon S. Wilson, Chris Lanthem, Frank Thornton, George L Stefanek, Timothy Stapko, James F. Ransome PhD, CISM, CISSP, John Rittinghouse PhD, CISM, Stephen A. Rackley, Chris Hurley, Tony Bradley, Dan Bensky, Praphul Chandra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Attacks and Risks

Regardless of whether computer and network data are transmitted on a wired or wireless medium, the basic security concepts remain much the same. Some of the content presented here has been excerpted from the Cybersecurity Operations Handbook [1] with the permission of Digital Press, an imprint of Elsevier Science.

For those among us who are tasked with managing business, and for that ever-shrinking number of Information Technology (IT) professionals who are not directly involved in the daily struggles coping with cybersecurity issues, one might be tempted to ask,

“What is the big deal about cybersecurity, really?”

“How does it affect our company infrastructure?”

“How does it affect users in our organization?” ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required