-
Book Overview & Buying
-
Table Of Contents
CEH v10 Certified Ethical Hacker Study Guide
By :
THE FOLLOWING CEH EXAM TOPICS ARE COVERED IN THIS CHAPTER:
Wireless access technology
Network topologies
Communication on protocols
Mobile technologies
Security policy implications
There was a time when you needed actual physical access to a facility in order to get onto a company’s network. This is no longer true. These days, you likely just need physical proximity. Wireless networks are ubiquitous, especially as devices that have no ability to take in a traditional wired connection become more predominant. The problem with wireless networks, though, is that they use radio waves as the transmission medium. The signal strength isn’t nearly the same as an AM or FM signal you would pick up with a radio you would listen to. The principle is the same, though. A signal is sent from a transmitter through the air and a receiver gets the signal, as long as the receiver is within range.
Because...
Change the font size
Change margin width
Change background colour