The Five-Access Point Security Plan Anthony Pell 1 min read Nov 23, 2004 This documentation discusses the five access points that need to be protected for you to minimize an attacker's entry to each identified access point in the network. Prev: Securing Wireless Networks Next: Network monitoring, access control, and booby traps using TCP Wrappers