WiFi Security 1st Edition by Stewart Miller – Ebook PDF Instant Download/Delivery: 0071429174, 9780071429177
Full download WiFi Security 1st Edition after payment
Product details:
ISBN 10: 0071429174
ISBN 13: 9780071429177
Author: Stewart Miller
By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs and shows how to prevent breaches caused by weak encryption protocols. * Review security approaches for the different standards currently competing for the U.S. market * Addresses data compromise, unauthorized access, and denial of service–all critical to WLAN users * Covers the 802.11 IEEE standard in regards to security, performance, and throughput * Discusses encryption and privacy through the WEP (Wired Equivalent Privacy) protocol
Table of contents:
CHAPTER 1 Introduction to Wireless LAN Security Standards
Wireless Defined
Factors of Security
Theft
Access Control
Authentication
Encryption
Safeguards
Intrusion Detection Systems
IEEE
WECA
Wi-Fi
The Many Flavors of 802.11
FHSS
DSSS
OFDM
Bluetooth
Differences between the Wireless Standards
Conclusion: How Security Applies
CHAPTER 2 Technology Comparisons
HomeRF
802.11 versus SWAP
SWAP Specification
Integrating Wireless Phone and Data
Bluetooth
Wireless Hacking
NetStumbler
NetStumbler Software Uses
Script Kiddies
Facts
Bluetooth Technology
Bluetooth Background
What Gives Bluetooth Its Bite?
Bluetooth Spectrum Hopping
Bluetooth Connections
Enforcing Security
Link Me Up!
Conclusion: The Future of the WLAN
CHAPTER 3 Wireless LAN Security Factors
Enabling Encryption Security
WEP Encryption
Encrypting 802.11b?
Network Interface Cards
Cross-Platform Hacking
Eavesdropping
Breaking In!
Counterfeiting
Wireless DoS Attack
Points of Vulnerability
Your Best Defense Against an Attack
Conclusion: Keeping Your WLAN Secure
CHAPTER 4 Issues in Wireless Security
The State of Wireless LAN Security
Securing Your WLAN
Authenticating Data
Client Authentication in a Closed System
Shared Key Authentication
RC4
Ensuring Privacy
Keeping Data Intact
Managing Keys
WLAN Vulnerabilities
Subtle Attacks
Common Security Pitfalls
Poor Security, Better than No Security at All!
Short Keys
Initialization Vectors
Shared Keys
Checks and Balances for Packets
Authentication
Location! Location! Location!
Attack Patterns
Active Attack Patterns
Passive Attacks
Conclusion
CHAPTER 5 The 802.11 Standard Defined
The 802.11 Standard
Issues to Consider
Expanding the Network Standard
Ad Hoc Networks
Extended Service Set
Wireless Radio Standard
The Standard Algorithm
Address Spaces
The 802.11 Standard in Security
Encryption
Timing and Power Management
Speed
Compatibility
Standard “Flavors” of 802.11
802.11a
802.11b
802.11d
802.11e
802.11f
802.11g
802.11h
802.11i
Conclusion: Evolution of the 802.11 Standard
CHAPTER 6 802.11 Security Infrastructure
Point-to-Point Wireless Application Security
Point of Interception
Wireless Vulnerability
Building a Private Wireless Infrastructure
Vulnerable Encryption
Commercial Security Infrastructure
Building a Private Infrastructure
Items to Compromise
Deploying Your Wireless Infrastructure
Determining Requirements
Choosing a Flavor of 802.11
Security Design
Monitoring Activity
Conclusion: Maintaining a Secure Infrastructure
CHAPTER 7 802.11 Encryption: Wired Equivalent Privacy
Why WEP?
Defending Your Systems
WEP Mechanics
Wireless Security Encryption
Insecure Keys
Taking a Performance Hit
Wireless Authentication
Known WEP Imperfections
Access Control
IRL Security
Points of Vulnerability
Conclusion: Finding Security in an Unsecured World
CHAPTER 8 Unauthorized Access and Privacy
Privacy in Jeopardy
Passive Attacks
Broadcast Monitoring
Active Attacks
The “Evil” Access Point
Data Privacy
Compromising Privacy in Public Places
Protecting Your Privacy
Public or Private?
Safer Computing
The “Human” Factor
Defining the Bullet Points in a Security Policy
Training
Physical Security
Wireless Range
Conclusion: Common Sense Access Controls
CHAPTER 9 Open System Authentication
What is Open System Authentication?
802.11 Networks on Windows XP
User Administration
Managing Keys in an Open System
Authentication Concerns
802.11b Security Algorithms
Authentication Support
Shared-key Authentication
Secret Keys
The WEP Algorithm
Static Vulnerabilities
NIC Security
Wireless NIC Power Settings
Open System to WEP Authentication
Port-based Network Access Control
Securely Identifying Wireless Traffic
Extensible Authentication Protocol
Conclusion: Open System versus Closed System Authentication
CHAPTER 10 Direct Sequence Spread Spectrum
802.11 DSSS
Standardization
MAC Layers
CSMA
Roaming
Power Requirements
Increasing Data Transmission
FHSS Security
Hop Sequences
FHSS versus DSSS
Frequency Allocation
Open System Security
It’s All About …Timing
System Roaming
Conclusion: Spectrum Safety!
CHAPTER 11 Wi-Fi Equipment Issues
Issues in Wi-Fi Deployment
Wireless Equipment Vendors
WLAN Equipment Considerations
Equipment Vendors
Market Trends
Technology Issues
Access Point-centric Configuration
Mobile Device Configuration
Building Extensions to Access Points
Directional Broadcasting
Cost Concerns
The Costs of Effective Security
Wired versus Wireless Security
Vendor Trials
Conclusion: Next-generation Wireless Equipment
CHAPTER 12 Cross-Platform Wireless User Security
WLAN Assignment Applications
Cost Concerns
Macintosh WLANs
Lindows OS
Orinoco Wireless
Handheld Devices
Cross-platform Wireless Security Concerns
Initialization Vector Collisions
Key Reuse
Evil Packets
Real-time Decryption
802.11 Security Issues
Windows XP Wireless Connectivity
Windows XP WEP Authentication
Windows XP Wireless Functionality
WLAN NIC Vendors
Conclusion: All Vendors Must Get Along!
CHAPTER 13 Security Breach Vulnerabilities
Intercepting Wireless Network Traffic
Wireless 802.11b
Proximity Attack
Securing Your Network
WAP Attack!
Encryption
Commonsense Measures
Windows Users
Macintosh Computers
Linux Boxes
PnP Networked Devices
Hacking the Network Printer
Printer Servers
Defending Against Attacks
Conclusion: Limiting Your Vulnerabilities
CHAPTER 14 Access Control Schemes
Authentication
Windows XP Access and Authentication Schemes
Access Control Procedures
Physical Security
Controlling Access to Access Points
Physical Access Point Security
Secure Access Point Management Issues
Preventive Measures
MAC the Knife
VPN
IP Addressing Issues
Conclusion: Ensuring “Secure” Access Control
CHAPTER 15 Wireless Laptop Users (PC and Mac)
Laptop Physical Security
Protection
Hardware Solutions
Public Key Infrastructure
Portable Biometrics
Reducing WEP Vulnerabilities
Securing the WLAN
Platform Bias
Wireless Laptop Network Support
Enhancing Mobile Security
Remote Users
Conclusion: Evolving Laptop Security
CHAPTER 16 Administrative Security
Authentication Solutions
Passwords
Building the Firewall
Intrusion Detection Systems
Host-based IDS
Network-based IDS
Host IDS versus Network IDS
Why Have an IDS?
The Computer as the Decision Maker
Real Live People
Security Vulnerability Assessment
Risk Assessment
Conclusion: Best Defense Is a Good Offense!
CHAPTER 17 Security Issues for Wireless Applications (Wireless PDAs)
Protecting Information
PDA Data
Seeking Security
Security Functionality
Access Control
HotSync
Infrared
Building an Effective Mobile Security Policy
Protecting Mobile Resources
Wireless Connectivity
HotSync Security
Infrared Authentication
Establishing a Security Policy
Privacy Concerns
Why PDAs Require Privacy
Maintaining Access Control
Data Encryption
SecurID
Intranet Access with Your PDA
How Hackers Fit into the Equation
Security Concerns
PDAs as Diagnostic Tools
PocketDOS
Wireless Service Providers
GoAmerica Communications
SprintPCS
AT&T Wireless IP Network
Conclusion: Mobile Wireless Computing
CHAPTER 18 The Future of Wi-Fi Security?
Privacy Regulations
Patriot Act, 2001 (USPA)
Graham-Leach-Billey (GLB) Act, 2001
Fair Credit Reporting Act, 1970, 1996 (FCRA)
Children’s Online Privacy Protection Act of 1998 (COPPA)
Health Insurance Portability and Accountability Act (HIPPA) [August 21, 1996]
Pervasive Computing
Wireless Mobile Computing
Evolving Security
Basic Encryption
WEP
Protecting Access
Denial of Service Attacks
Evolving Standards
Competing Standards
Enhancing Your Wireless Security
Biometrics
Assessing WLAN Strengths and Weaknesses
Combining Future WLAN Technology
Smart Systems
Scrambled Data
OS Platform Evolution
Windows XP Security
Macintosh OS X
Palm and PocketPC
Linux
Lindows OS
Preventing Network Intrusion Attempts
Network Servers
File Servers
Printer Servers
Conclusion: The Future of Wireless Networking
People also search:
wifi security standard
1st security self storage
1st security usa
security-1st.com
1st security alarm
Tags: Stewart Miller, WiFi, Security