Table of Contents

Advertisement

Security

If security settings have not been properly set, the following problems may
occur.
Transmission monitoring
z
Third parties with malicious intent may monitor the Wi-Fi transmissions
and attempt to acquire the data you are sending.
Unauthorized network access
z
Third parties with malicious intent may gain unauthorized access to
the network you are using to steal, modify, or destroy information.
Additionally, you could fall victim to other types of unauthorized access
such as impersonation (where someone assumes an identity to gain
access to unauthorized information) or springboard attacks (where
someone gains unauthorized access to your network as a springboard
to cover their tracks when infiltrating other systems).
It is recommended to make use of the systems and functions to thoroughly
secure your network, preventing these types of problems from occurring.
441

Advertisement

Table of Contents
loading

This manual is also suitable for:

3454c010aa

Table of Contents