Wireless Operational Security

V

Vendor-assisted hacking, 90

Verification, 149 “50

Violations Reporting Policy, 164

Virtual Ethernet Interface (VEI), 261

Virtual Local Area Networks (VLANs), 187 “88

configuration, 189 “90

support, 187

Virtual Private Networks (VPNs), 240 “60

advantages, 240, 241

concentrators , 262

connections, 242, 245

disadvantages, 242

industry acceptance, 242

IPSec/IKE, 249 “53

L2TP/IPSec, 247 “49

Layer 3, 243

linking, 240

Mobile IP and, 258 “60

over wireless medium, 241

port forwarding and, 255

PPTP, 246 “47

public key authentication and, 256 “58

RADIUS and, 292

redirection, 245

secure shells and, 254 “55

servers, 244

SFTP and, 253, 256

solution considerations, 243 “44

SSH2, 253

tunneling, 241

types, 244 “53

value, 272

in WLANs, 244

Virtual Router Redundancy Protocol (VRRP), 268

Virus incidents, 217

Voice communications, authority to intercept, 102

Voice-mail communications, 102 “3

Voice over IP (VoIP), 303

Категории