The first point in security is access security:
- Here, a protective mechanism is involved which allows access to the network only to authorized users.
- On the other hand, however, it must also be ensured that the client is connected to the precise desired AP, and not to some other AP with the same name which has been smuggled in by some nefarious third party. Such an authentication can be provided, for example, using certificates or passwords.