One day, he brought his laptop into the office to give a presentation, but forgot to remove the wireless NIC. Several months ago, a friend told me that he doesn't have a wireless network in his office, but he does have one at home. The first type you have to watch out for is an insecure access point on a neighbor's network. Let's take a closer look at these three categories, and then I'll show you how Kismet, a free tool you can download, can help you track down rogue access points-even the ones that try to avoid detection. The most heavily publicized rogue threats are rogue access points, and there are basically three forms:
Rogue components refer to any unauthorized wireless component. After you apply these techniques, the biggest threat to wireless security becomes rogue wireless components. Fortunately, there are several strategies you can use to make a wireless network relatively secure. Most administrators are at least a little uncomfortable with the thought of sensitive or confidential data just floating through the air for anyone to intercept. Security concerns have been an issue from the moment the first wireless networks hit the market.