ABSTRACT

Many companies that entered the newly formed wireless security market adapted and created tools to detect rogue access points. Some companies have handled rogue access points by creating policies about wireless usage and imposing strict penalties for rogue access placement. The Wireless-Fidelity Protected Access standard has an interesting history in relation to how it came to be a standard. When the security of wired equivalent privacy was broken, the industry turned to the IEEE to fix it. The IEEE created the 802.11i wireless security standard but developing this standard took a long time. In a wireless security policy, passwords are often used. In order to keep everything from contradicting, two actions can be undertaken. First is to update all general policies that wireless can affect; this means updating the password policy, acceptable use and abuse policies, and many others. This makes the wireless security policy scattered across many other policies making it hard to update and maintain.