Statements (33)
Predicate | Object |
---|---|
gptkbp:instanceOf |
network security technology
|
gptkbp:alerts |
network administrators
|
gptkbp:block |
wireless attacks
unauthorized devices rogue access points |
gptkbp:canBe |
hardware-based
software-based |
gptkbp:complement |
wired IPS
|
gptkbp:component |
network security infrastructure
|
gptkbp:detects |
denial-of-service attacks
eavesdropping man-in-the-middle attacks brute-force attacks MAC spoofing ad-hoc networks malicious wireless activity unauthorized SSIDs |
https://www.w3.org/2000/01/rdf-schema#label |
Wireless IPS
|
gptkbp:integratesWith |
firewalls
SIEM systems network access control systems |
gptkbp:monitors |
wireless network traffic
|
gptkbp:prevention |
wireless attacks
|
gptkbp:provides |
real-time protection
|
gptkbp:purpose |
detect and prevent unauthorized wireless network access
|
gptkbp:relatedTo |
intrusion prevention system
Wireless IDS |
gptkbp:requires |
wireless sensors
central management system |
gptkbp:standsFor |
Wireless Intrusion Prevention System
|
gptkbp:used_in |
enterprise networks
|
gptkbp:bfsParent |
gptkb:intrusion_prevention_system
|
gptkbp:bfsLayer |
5
|