The task of protecting wireless networks is now more relevant than ever. As the environment of data transmission in wireless networks is opened (it's necessary to have only the client adapter for getting access to the network), it's important to organize the protection of the network from unauthorized access. The article deals with methods of information security used in wireless networks, their advantages and disadvantages.
wireless network, environment of data transmission, technology, authorization, identifier, the access point.
"Metody zakhystu danykh u wi-fi merezhakh" ,
Science and Technology of the Air Force of Ukraine,