We opened this chapter by discussing what happens when a client device makes an association with a wireless router/access and the various wireless security standards that are currently being used in organizations globally. Later in this chapter, we took a look at identifying common network attacks and threats and understanding the benefits of applying recommended practices to help mitigate various threats on a network infrastructure.
In the next chapter, we will be covering security in the TCP/IP stack, and explain the vulnerabilities that exist in each layer of TCP/IP.