Wireless Security
Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery Exhaustion WEP War-Driving Network Access Control
1 / 41