← Back to Glossary
Wireless Deception
Deploying decoy wireless networks and access points to detect unauthorized wireless scanning and attack attempts.
Deploying decoy wireless networks and access points to detect unauthorized wireless scanning and attack attempts.