Statements (31)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:network_security_technology
|
| gptkbp:alerts |
network administrators
|
| gptkbp:block |
wireless attacks
unauthorized devices rogue access points |
| gptkbp:canBe |
hardware-based
software-based |
| gptkbp:complement |
wired IPS
|
| gptkbp:component |
network security infrastructure
|
| gptkbp:detects |
denial-of-service attacks
eavesdropping man-in-the-middle attacks brute-force attacks MAC spoofing ad-hoc networks malicious wireless activity unauthorized SSIDs |
| gptkbp:integratesWith |
firewalls
SIEM systems network access control systems |
| gptkbp:monitors |
wireless network traffic
|
| gptkbp:prevention |
wireless attacks
|
| gptkbp:provides |
real-time protection
|
| gptkbp:purpose |
detect and prevent unauthorized wireless network access
|
| gptkbp:relatedTo |
gptkb:intrusion_prevention_system
Wireless IDS |
| gptkbp:requires |
wireless sensors
central management system |
| gptkbp:standsFor |
Wireless Intrusion Prevention System
|
| gptkbp:used_in |
enterprise networks
|
| http://www.w3.org/2000/01/rdf-schema#label |
Wireless IPS
|