There are various types of security threats aimed at security-sensitive wireless date.
Typical threats are Rogue AP, Key Cracking, MITM (Man-In-The-Middle attack), Fake AP, and Firmware Exploit.


Perspective of General Users
As the use of wireless networks increases, existing malicious code infections and hacking attacks
occur more frequently in individuals’ daily lives.
Wireless security should be practiced from the perspective of individual users.
NORMA’s Wi-Fi Care allows users to connect to secure Wi-Fi and pursue a comfortable
and enjoyable life in safe wireless environments without any security threat.

Perspective of Business Users
Various laws and regulations related to wireless security are enforced and gradually strengthened.
Technical security measures for wireless network like ISMS, ISO 27001, wireless security guidelines,
National information security basic guidelines, IT Protecting Businesses’ Best Practices of Financial Companies,
Information Security Operational Rule of Central Governments, Information Security Operational Rule of
Public Institutions, etc. are getting to be mandatory.
It is also required to inspect frequently for fetching and using unauthorized wireless connecting devices.
Integrated analysis solution helping you observe strengthening wireless security regulations
conveniently and systematically is required!


Obligation of Technical Security
Measurement for
Wireless Network
Obligation of constant inspecting
about whether unauthorized
wireless connection equipments
are carried in or utilized
