Home > Articles > Networking > Wireless/High Speed/Optical

Unwitting Collaborators, Part 6: Wireless Insecurity

  • Print
  • + Share This
"Wardrivers" don't need much more than a laptop, a network card, and a car to find and infiltrate wireless networks. This article explains how "wardriving" works and how to defend your company against it.
Read the introduction to this article series.
Like this article? We recommend

Introduction

To avoid the hassles of installing LAN lines or to hasten deployment of LANs, or even to allow for more mobility in the workplace, many organizations are installing wireless networks. These networks are being installed by organizations at a rapid rate.

Unfortunately, organizations don't see the threats posed to their network security by wireless networks, or don't understand that a wireless network should be treated as you would any other medium—using it as a transport layer only. Sending information through a wireless network potentially opens your network for the entire world to see. It's akin to sending a postcard through email and could open your network to "drive-by hacking."

  • + Share This
  • 🔖 Save To Your Account