Reilly, Robert2008-11-132008-11-132005-06https://hdl.handle.net/1794/7805vi, 81 p. This paper was completed as part of the final research component in the University of Oregon Applied Information Management Master's Degree Program [see htpp://aim.uoregon.edu].As Government regulations become more stringent, corporate responsibility to ensure data privacy increases. This study analyzes selected literature published between 1997 and 2005 to provide an analysis of wireless local area network security protocols based on compliance with criteria in the IEEE 802.lli standard. Capabilities, vulnerabilities and components are compared, to help IT executives form corporate security policy. Three protocols examined are Wired Equivalent Privacy, Wi-Fi Protected Access and Extensible Authentication Protocol-Transport Layer Security.Applied Information ManagementData privacyCorporate security policyWi-FiAuthentication protocolWLANsWireless local area networksProtected accessAIMDataWireless Local Area Network Security Protocols: Compliance with the IEEE 802.11i StandardOther