
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide
By :

Every time I hear six layers, I always think of the Six Degrees of Kevin Bacon (oracleofbacon.org), and I'm sure if I start with APs within six layers, I'll be able to get to Kevin Bacon, but let's talk about wireless security here:
Figure 11.11 – The six layers of wireless security
Let's briefly discuss these layers:
In wireless networks, the continuous monitoring and managing of the RF spectrum within your environment helps to identify threats and makes you aware of its capabilities. You may want to invest in something like an IDS system or even in a wireless intrusion detection system (WIDS). Previously, I discussed how to limit the length of the transmission of your wireless network by using a reflector of some sort.
I've also heard of users removing antennas from APs. Just because the antenna isn't physically attached, doesn&apos...
Change the font size
Change margin width
Change background colour