Journal of Theoretical and Applied Electronic Commerce Research
ACM Transactions on Information and System Security (TISSEC)
Hi-index | 0.00 |
Wireless access points bring great convenience tothe enterprise network, and also bring a large collectionof vulnerabilities into the enterprise environment.Wireless users pose new difficulties in authenticationand confidentiality that can intentionally orinadvertently pose a threat to their wired colleagues. Acomprehensive network vulnerability analysis mustaddress wireless environment threats andvulnerabilities, including identification of unauthorizedWireless Access Points and incorrectly configuredclients. This paper discusses the issues associated withvulnerability assessment in a wireless network and arecommended approach to integrating wireless devicesinto vulnerability scanning methodologies.