As wireless technology becomes more pervasive, there is likely to be an increase in security incidents as a result of the ease with which many wireless networks can be compromised.
This presentation covers the issues and risks associated with deploying this technology. It also covers best practice methods for authentication, authorisation, and access. Real life compromises will be discussed (no names of course!), as well as examples drawn from recent war-driving activities.