Home Page Icon
Home Page
Table of Contents for
Part IV. Other Wireless Technology
Close
Part IV. Other Wireless Technology
by Jon S. Wilson, Chris Lanthem, Frank Thornton, George L Stefanek, Timothy Stapko,
Wireless Security: Know It All
Brief Table of Contents
Table of Contents
Copyright Page
About the Authors
Part I. Wireless Technology
Chapter 1. Wireless Fundamentals
1.1. The Wireless Medium
1.2. Wireless Networking Basics
Chapter 2. Wireless Network Logical Architecture
2.1. The OSI Network Model
2.2. Network Layer Technologies
2.3. Data Link Layer Technologies
2.4. Physical Layer Technologies
2.5. Operating System Considerations
2.6. Summary
Chapter 3. Wireless Network Physical Architecture
3.1. Wired Network Topologies—A Refresher
3.2. Wireless Network Topologies
3.3. Wireless LAN Devices
3.4. Wireless PAN Devices
3.5. Wireless MAN Devices
Chapter 4. Radio Communication Basics
4.1. Mechanisms of Radio Wave Propagation
4.2. Open Field Propagation
4.3. Diffraction
4.4. Scattering
4.5. Path Loss
4.6. Multipath Phenomena
4.7. Flat Fading
4.8. Diversity Techniques
4.9. Noise
4.10. Communication Protocols and Modulation
4.11. Summary
References
Chapter 5. Infrared Communication Basics
5.1. The Ir Spectrum
5.2. Infrared Propagation and Reception
5.3. Summary
Chapter 6. Wireless LAN Standards
6.1. The 802.11 WLAN Standards
6.2. The 802.11 MAC Layer
6.3. 802.11 PHY Layer
6.4. 802.11 Enhancements
6.5. Other WLAN Standards
6.6. Summary
Chapter 7. Wireless Sensor Networks
7.1. Introduction to Wireless Sensor Networks
7.2. Individual Wireless Sensor Node Architecture
7.3. Wireless Sensor Networks Architecture
7.4. Radio Options for the Physical Layer in Wireless Sensor Networks
7.5. Power Consideration in Wireless Sensor Networks
7.6. Applications of Wireless Sensor Networks
7.7. Future Developments
Part II. Security Defi nitions and Concepts
Chapter 8. Attacks and Risks
8.1. Threats to Personal Privacy
8.2. Fraud and Theft
8.3. Internet Fraud
8.4. Employee Sabotage
8.5. Infrastructure Attacks
8.6. Malicious Hackers
8.7. Malicious Coders
8.8. Industrial Espionage
8.9. Social Engineering
Chapter 9. Security Defined
9.1. What Is Security?
9.2. What Can We Do?
9.3. Access Control and the Origins of Computer Security Theory
9.4. Security Policies
9.5. Data Integrity and Authentication
9.6. Recommended Reading
Chapter 10. Standardizing Security
10.1. Protocol Madness
10.2. Standardizing Security—A Brief History
10.3. Standardized Security in Practice
10.4. Cryptography and Protocols
10.5. Other Security Protocols
Chapter 11. Secure Sockets Layer
11.1. SSL History
11.2. Pesky PKI
11.3. PKI Alternatives
11.4. SSL under the Hood
11.5. The SSL Session
11.6. SSL in Practice
Chapter 12. Cryptography
12.1. Do We Need Cryptography?
12.2. Hashing—Low Security, High Performance
12.3. To Optimize or Not to Optimize…
12.4. Choosing Cryptographic Algorithms
12.5. Tailoring Security for Your Application
Chapter 13. Managing Access
13.1. Access Control
13.2. Password Management
Chapter 14. Security and the Law
14.1. The 1996 National Information Infrastructure Protection Act
14.2. President’s Executive Order on Critical Infrastructure Protection
14.3. The USA Patriot Act of 2001
14.4. The Homeland Security Act of 2002
14.5. Changes to Existing Laws
14.6. Investigations
14.7. Ethics
Chapter 15. Intrusion Process
15.1. Profiling To Select a Target or Gather Information
15.2. Social Engineering
15.3. Searching Publicly Available Resources
15.4. War-Driving, -Walking, -Flying, and -Chalking
15.5. Exploitable WLAN Configurations
15.6. How Intruders Obtain Network Access to a WLAN
15.7. Password Gathering and Cracking Software
15.8. Share Enumerators
15.9. Using Antennas and WLAN Equipment
15.10. Denial-of-Service Attacks and Tools
15.11. Rogue Devices as Exploitation Tools
References
Chapter 16. Security Policy
16.1. Best Practice #1
16.2. Best Practice #2
16.3. Best Practice #3
Part III. Wireless Network Security
Chapter 17. Security in Traditional Wireless Networks
17.1. Security in First Generation TWNs
17.2. Security in Second Generation TWNs
17.3. Security in 2.5 Generation TWNs
17.4. Security in 3G TWNs
17.5. Summary
Chapter 18. Wireless LAN Security
18.1. Introduction
18.2. Key Establishment in 802.11
18.3. Anonymity in 802.11
18.4. Authentication in 802.11
18.5. Confidentiality in 802.11
18.6. Data Integrity in 802.11
18.7. Loopholes in 802.11 Security
18.8. WPA
18.9. WPA2 (802.11i)
Chapter 19. Security in Wireless Ad Hoc Networks
19.1. Introduction
19.2. Bluetooth
Chapter 20. Implementing Basic Wireless Security
20.1. Introduction
20.2. Enabling Security Features on a Linksys WAP11 802.11 b Access Point
20.3. Filtering by Media Access Control (MAC) Address
20.4. Enabling Security Features on a Linksys BEFW11 SR 802.11 b Access Point/Router
20.5. Enabling Security Features on a Linksys WRT54G 802.1 lb/g Access Point/Router
20.6. Enabling Security Features on a D-Link DI-624 AirPlus 2.4 GHz Xtreme G Wireless Router with 4-Port Switch
20.7. Configuring Security Features on Wireless Clients
20.8. Summary
20.9. Solutions Fast Track
Chapter 21. Implementing Advanced Wireless Security
21.1. Introduction
21.2. Implementing Wi-Fi Protected Access (WPA)
21.3. Implementing a Wireless Gateway with Reef Edge Dolphin
21.4. Implementing a VPN on a Linksys WRV54G VPN Broadband Router
21.5. Implementing RADIUS with Cisco LEAP
21.6. Understanding and Configuring 802.1X RADIUS Authentication
21.7. Summary
21.8. Solutions Fast Track
Part IV. Other Wireless Technology
Chapter 22. Home Network Security
22.1. Introduction
22.2. The Basics of Wireless Networks
22.3. Basic Wireless Network Security Measures
22.4. Additional Hotspot Security Measures
22.5. Summary
22.6. Additional Resources
Chapter 23. Wireless Embedded System Security
23.1. Wireless Technologies
23.2. Bluetooth
23.3. ZigBee
23.4. Wireless Technologies and the Future
Chapter 24. RFID Security
24.1. Introduction
24.2. RFID Security in General
24.3. RFID Radio Basics
24.4. Why Use RFID?
24.5. RFID Architecture
24.6. Data Communications
24.7. Physical Form Factor (Tag Container)
24.8. Threat and Target Identification
24.9. Management of RFID Security
24.10. Summary
24.11. Links to Sites
Appendix A. Wireless Policy Essentials
A.1. Wireless position statement
A.2. ABC Inc. InfoSec Risk Assessment Policy
A.3. ABC Inc. InfoSec Audit Policy
A.4. ABC Inc. InfoSec Acceptable Use Policy
A.5. ABC Inc. InfoSec Network Policy
A.6. ABC Inc. InfoSec De-Militarized Zone (DMZ) Policy
A.7. ABC Inc. InfoSec Router Policy
A.8. ABC Inc. InfoSec Extranet Policy
A.9. ABC Inc. InfoSec Remote Access Policy
A.10. ABC Inc. InfoSec Dial-In Access Policy
A.11. ABC Inc. InfoSec VPN Communication Policy
A.12. ABC Inc. InfoSec Wireless Communication Policy
A.13. ABC Inc. InfoSec Server Policy
A.14. ABC Inc. InfoSec Password Policy
A.15. ABC Inc. InfoSec Application Password Policy
A.16. ABC Inc. InfoSec Anti-Virus Policy
A.17. ABC Inc. InfoSec Policy Exception Form
B. Glossary
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Chapter 21. Implementing Advanced Wireless Security
Next
Next Chapter
Chapter 22. Home Network Security
Part IV. Other Wireless Technology
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset