About 50 results
Open links in new tab
  1. Securing Wireless Networks - CISA

    Feb 1, 2021 · Wireless networks introduce additional security risks. If you have a wireless network, make sure to take appropriate precautions to protect your information.

  2. 1. Introduction This guide summarizes leading practices and technical guidance for securing networks from wireless threats and for securely implementing wireless access to networks. This document is …

  3. If you’re using wireless technology, or considering making the move to wireless, you should know about the security threats you may encounter. This paper highlights those threats, and explains what you …

  4. Securing Enterprise Wireless Networks - CISA

    Feb 1, 2021 · Wireless networks often lack the robust security protections and are susceptible to infiltration through wireless access points. Organizations should take steps to secure their enterprise …

  5. Module 5: Securing Your Home Wi-Fi - CISA

    If you don’t secure your home Wi-Fi network, cyber threat actors can perform a number of operations that are detrimental to your privacy and security. For high-risk communities in particular, securing …

  6. Home Network Security - CISA

    Feb 1, 2021 · Home users should understand and remain vigilant about the risks of being connected to the internet and the importance of properly securing home networks and systems.

  7. Kismet - CISA

    Kismet is a console (ncurses)-based 802.Q1 layer-2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing and can decloak hidden (non-beaconing) …

  8. Wireless Network Vulnerability Scanning - CISA

    Receive wireless network vulnerability scanning that includes analysis, classification, and record of detected wireless devices; a review of access points; and comprehensive report identifying all …

  9. 5G Security and Resilience - CISA

    Jul 17, 2023 · 5G Security and Resilience The fifth generation (5G) of wireless technology represents a complete transformation of telecommunication networks.

  10. Unauthorized access to software or network components provides a malicious actor with the opportunity to modify configurations to reduce security controls, install malware on the system, or identify …