First page Back Continue Last page Overview Graphics
Security Needs
Determine what the real threat is.
- What are your security policies and incident response procedures?
- Terms of service for open and semi-open APs
Access Monitoring and Accounting
- Who is logging in and what are they doing?
Firewalling
- Minimizing attacks
- Preventing access to “internal” resources
- ie. Account lists, AP software
Resource Allocation
Notes: