Does anyone out there know what realistic problems exist with wirless networks?
We use several point-to-point devices, and point-to-multipoint. Is it possible for someone to evasdrop on the point-to-points? Is that type of equipment avaliable to the common/avid user to allow them to perform such activites? Also, it's all good protecting your network from outside attacks, but what about internal attacks? I would assume one must be more cunning when attempting to prevent internal compromises! I'd like to hear what you all think about these issues. (Thank you in advance) Dickon...
