In as the chapter one brief introduction on the concepts of nets TCP/IP and its classifications of internal and external nets will be carried through a briefing study on nets TCP/IP giving, also approaching the main standards of communication of nets wireless exemplificando its available types of functioning. 4 In the third chapter wireless will be detached the main types of criptografias used for the technology. In the room chapter wireless will be boarded the main techniques of invasion in nets citing some tools used for such procedures. In the fifth chapter he will be boarded the main forms of if protecting nets wireless, through techniques and softwares for blockade and protection against intruders. In the sixth chapter insurance will be presented the conclusion of the work with the points most significant to get a net without wire more. In the seventh chapter he will be boarded a study of case to enrich the concepts of this academic work. 5 2,1 SECURITY GUARD OF the INFORMATION (ITSELF) Understands for security of the information the set of measures of controls and security politics, that objectifies the protection of the information, wants is of the customers or companies, controlling the risk of revelation or alteration for not authorized people.
As it affirms Towers (2001, P. 415): The active systems of security aim at to prevent that structuralized onslaughts are made against a net or a specific system. They independem that malintencionadas people obtain to explore breaches and vulnerability with the objective to penetrate in the system with suspicious objectives. In accordance with NBR ISO/IEC 17799 (2005) defines ITSELF as: it is the politics of existing protection on the information of one determined organization of some types of threats to guarantee the continuity of the business, to minimize risks, to maximize the return on the investments and the chances of the business. It can be kept for use restricted or displayed to the public for consultation or acquisition.