Skip to content

Wi-Fi Security

Best in textbook rentals since 2012!

ISBN-10: 0071410732

ISBN-13: 9780071410731

Edition: 2003

Authors: Stewart Miller

List price: $49.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant Stewart Miller covers security for Windows, Linux, Macs, Palms and other PDAs and shows how to prevent breaches caused by weak encryption protocols.
Customers also bought

Book details

List price: $49.95
Copyright year: 2003
Publisher: McGraw-Hill Professional Publishing
Publication date: 1/22/2003
Binding: Paperback
Pages: 309
Size: 7.30" wide x 9.10" long x 0.91" tall
Weight: 1.474
Language: English

Stewart S. Miller has more than a decade of highly specialized technical security and privacy expertise. He has published 11 books in the computer field and over 1000 feature articles. Miller is the country's leading IT security and efficiency management expert. Known best as an executive senior consultant, Stewart has created market analysis/research for hundreds of leading Fortune 500 companies. Stewart has worked with major organizations including IBM and Ernst & Young; he is very well-known for his expertise with complex enterprise systems including SAP, J.D. Edwards, Baan, and PeopleSoft. He has demonstrated his leadership and communication skills as the keynote lecturer for the…    

Prefacep. xvii
Introduction to Wireless LAN Security Standardsp. 1
Wireless Definedp. 2
Factors of Securityp. 2
Theftp. 3
Access Controlp. 4
Authenticationp. 4
Encryptionp. 5
Safeguardsp. 6
Intrusion Detection Systemsp. 7
IEEEp. 9
WECAp. 9
Wi-Fip. 9
The Many Flavors of 802.11p. 9
FHSSp. 10
DSSSp. 11
OFDMp. 12
Bluetoothp. 12
Differences between the Wireless Standardsp. 13
Conclusion: How Security Appliesp. 14
Technologyp. 17
Comparisonsp. 17
HomeRFp. 18
802.11 versus SWAPp. 18
SWAP Specificationp. 19
Integrating Wireless Phone and Datap. 19
Bluetoothp. 19
Wireless Hackingp. 20
NetStumblerp. 20
NetStumbler Software Usesp. 22
Script Kiddiesp. 22
Factsp. 24
Bluetooth Technologyp. 25
Bluetooth Backgroundp. 25
What Gives Bluetooth Its Bite?p. 26
Bluetooth Spectrum Hoppingp. 27
Bluetooth Connectionsp. 28
Enforcing Securityp. 30
Link Me Up!p. 31
Conclusion: The Future of the WLANp. 32
Wireless LAN Security Factorsp. 33
Enabling Encryption Securityp. 35
WEP Encryptionp. 36
Encrypting 802.11b?p. 36
Network Interface Cardsp. 36
Cross-Platform Hackingp. 37
Eavesdroppingp. 39
Breaking In!p. 40
Counterfeitingp. 40
Wireless DoS Attackp. 41
Points of Vulnerabilityp. 42
Your Best Defense Against an Attackp. 45
Conclusion: Keeping Your WLAN Securep. 47
Issues in Wireless Securityp. 49
The State of Wireless LAN Securityp. 50
Securing Your WLANp. 50
Authenticating Datap. 51
Client Authentication in a Closed Systemp. 53
Shared Key Authenticationp. 53
RC4p. 53
Ensuring Privacyp. 54
Keeping Data Intactp. 55
Managing Keysp. 56
WLAN Vulnerabilitiesp. 58
Subtle Attacksp. 59
Common Security Pitfallsp. 59
Poor Security, Better than No Security at All!p. 59
Short Keysp. 59
Initialization Vectorsp. 60
Shared Keysp. 60
Checks and Balances for Packetsp. 60
Authenticationp. 61
Location! Location! Location!p. 61
Attack Patternsp. 62
Active Attack Patternsp. 62
Passive Attacksp. 63
Conclusionp. 63
The 802.11 Standard Definedp. 65
The 802.11 Standardp. 66
Issues to Considerp. 66
Expanding the Network Standardp. 69
Ad Hoc Networksp. 69
Extended Service Setp. 69
Wireless Radio Standardp. 70
The Standard Algorithmp. 71
Address Spacesp. 72
The 802.11 Standard in Securityp. 72
Encryptionp. 73
Timing and Power Managementp. 73
Speedp. 75
Compatibilityp. 75
Standard "Flavors" of 802.11p. 76
802.11ap. 76
802.11bp. 77
802.11dp. 77
802.11ep. 78
802.11fp. 78
802.11gp. 78
802.11hp. 79
802.11ip. 79
Conclusion: Evolution of the 802.11 Standardp. 80
802.11 Security Infrastructurep. 83
Point-to-Point Wireless Application Securityp. 84
Point of Interceptionp. 84
Wireless Vulnerabilityp. 86
Building a Private Wireless Infrastructurep. 88
Vulnerable Encryptionp. 89
Commercial Security Infrastructurep. 89
Building a Private Infrastructurep. 90
Items to Compromisep. 91
Deploying Your Wireless Infrastructurep. 92
Determining Requirementsp. 92
Choosing a Flavor of 802.11p. 93
Security Designp. 96
Monitoring Activityp. 97
Conclusion: Maintaining a Secure Infrastructurep. 97
802.11 Encryption: Wired Equivalentp. 99
Privacyp. 99
Why WEP?p. 100
Defending Your Systemsp. 100
WEP Mechanicsp. 103
Wireless Security Encryptionp. 103
Insecure Keysp. 104
Taking a Performance Hitp. 104
Wireless Authenticationp. 105
Known WEP Imperfectionsp. 107
Access Controlp. 108
IRL Securityp. 109
Points of Vulnerabilityp. 109
Conclusion: Finding Security in an Unsecured Worldp. 111
Unauthorized Access and Privacyp. 113
Privacy in Jeopardyp. 114
Passive Attacksp. 114
Broadcast Monitoringp. 115
Active Attacksp. 116
The "Evil" Access Pointp. 117
Data Privacyp. 117
Compromising Privacy in Public Placesp. 118
Protecting Your Privacyp. 118
Public or Private?p. 120
Safer Computingp. 120
The "Human" Factorp. 122
Defining the Bullet Points in a Security Policyp. 122
Trainingp. 124
Physical Securityp. 124
Wireless Rangep. 126
Conclusion: Common Sense Access Controlsp. 127
Open System Authenticationp. 131
What is Open System Authentication?p. 132
802.11 Networks on Windows XPp. 133
User Administrationp. 134
Managing Keys in an Open Systemp. 135
Authentication Concernsp. 135
802.11b Security Algorithmsp. 136
Authentication Supportp. 137
Shared-key Authenticationp. 138
Secret Keysp. 138
The WEP Algorithmp. 138
Static Vulnerabilitiesp. 139
NIC Securityp. 139
Wireless NIC Power Settingsp. 140
Open System to WEP Authenticationp. 141
Port-based Network Access Controlp. 141
Securely Identifying Wireless Trafficp. 143
Extensible Authentication Protocolp. 144
Conclusion: Open System versus Closed System Authenticationp. 146
Direct Sequence Spread Spectrump. 147
802.11 DSSSp. 148
Standardizationp. 148
MAC Layersp. 149
CSMAp. 150
Roamingp. 150
Power Requirementsp. 151
Increasing Data Transmissionp. 151
FHSS Securityp. 154
Hop Sequencesp. 155
FHSS versus DSSSp. 155
Frequency Allocationp. 156
Open System Securityp. 158
It's All About...Timingp. 159
System Roamingp. 160
Conclusion: Spectrum Safety!p. 160
Wi-Fi Equipment Issuesp. 163
Issues in Wi-Fi Deploymentp. 164
Wireless Equipment Vendorsp. 164
WLAN Equipment Considerationsp. 165
Equipment Vendorsp. 167
Market Trendsp. 168
Technology Issuesp. 169
Access Point-centric Configurationp. 170
Mobile Device Configurationp. 170
Building Extensions to Access Pointsp. 171
Directional Broadcastingp. 172
Cost Concernsp. 172
The Costs of Effective Securityp. 174
Wired versus Wireless Securityp. 176
Vendor Trialsp. 176
Conclusion: Next-generation Wireless Equipmentp. 178
Cross-Platform Wireless User Securityp. 181
WLAN Assignment Applicationsp. 182
Cost Concernsp. 182
Macintosh WLANsp. 183
Lindows OSp. 185
Orinoco Wirelessp. 185
Handheld Devicesp. 186
Cross-platform Wireless Security Concernsp. 187
Initialization Vector Collisionsp. 188
Key Reusep. 188
Evil Packetsp. 189
Real-time Decryptionp. 189
802.11 Security Issuesp. 189
Windows XP Wireless Connectivityp. 192
Windows XP WEP Authenticationp. 192
Windows XP Wireless Functionalityp. 194
WLAN NIC Vendorsp. 194
Conclusion: All Vendors Must Get Along!p. 195
Security Breach Vulnerabilitiesp. 197
Intercepting Wireless Network Trafficp. 198
Wireless 802.11bp. 199
Proximity Attackp. 199
Security Your Networkp. 201
WAP Attack!p. 201
Encryptionp. 201
Commonsense Measuresp. 203
PnP Networked Devicesp. 203
Windows Usersp. 204
Macintosh Computersp. 205
Linux Boxesp. 205
Hacking the Network Printerp. 206
Printer Serversp. 207
Defending Against Attacksp. 208
Conclusion: Limiting Your Vulnerabilitiesp. 211
Access Control Schemesp. 215
Authenticationp. 216
Windows XP Access and Authentication Schemesp. 217
Access Control Proceduresp. 217
Physical Securityp. 218
Controlling Access to Access Pointsp. 219
Physical Access Point Securityp. 220
Secure Access Point Management Issuesp. 221
Preventive Measuresp. 225
MAC the Knifep. 225
VPNp. 225
IP Addressing Issuesp. 227
Conclusion: Ensuring "Secure" Access Controlp. 229
Wireless Laptop Users (PC and Mac)p. 231
Laptop Physical Securityp. 232
Protectionp. 232
Hardware Solutionsp. 233
Public Key Infrastructurep. 237
Portable Biometricsp. 237
Reducing WEP Vulnerabilitiesp. 239
Securing the WLANp. 241
Platform Biasp. 241
Wireless Laptop Network Supportp. 242
Enhancing Mobile Securityp. 243
Remote Usersp. 243
Conclusion: Evolving Laptop Securityp. 244
Administrative Securityp. 247
Authentication Solutionsp. 248
Passwordsp. 249
Building the Firewallp. 249
Intrusion Detection Systemsp. 250
Host-based IDSp. 252
Network-based IDSp. 253
Host IDS versus Network IDSp. 253
Why Have an IDS?p. 253
The Computer as the Decision Makerp. 254
Real Live Peoplep. 255
Security Vulnerability Assessmentp. 256
Risk Assessmentp. 257
Conclusion: Best Defense Is a Good Offense!p. 260
Security Issues for Wireless Applications (Wireless PDAs)p. 263
Protecting Informationp. 264
PDA Datap. 264
Seeking Securityp. 265
Security Functionalityp. 266
Access Controlp. 266
HotSyncp. 266
Infraredp. 266
Building an Effective Mobile Security Policyp. 268
Protecting Mobile Resourcesp. 268
Wireless Connectivityp. 268
HotSync Securityp. 270
Infrared Authenticationp. 270
Establishing a Security Policyp. 271
Privacy Concernsp. 272
Why PDAs Require Privacyp. 272
Maintaining Access Controlp. 273
Data Encryptionp. 273
SecurIDp. 273
Intranet Access with Your PDAp. 274
How Hackers Fit into the Equationp. 275
Security Concernsp. 275
PDAs as Diagnostic Toolsp. 275
PocketDOSp. 276
Wireless Service Providersp. 277
GoAmerica Communicationsp. 277
SprintPCSp. 277
AT&T Wireless IP Networkp. 278
Conclusion: Mobile Wireless Computingp. 279
The Future of Wi-Fi Security?p. 281
Privacy Regulationsp. 282
Patriot Act, 2001 (USPA)p. 282
Graham-Leach-Billey (GLB) Act, 2001p. 282
Fair Credit Reporting Act, 1970, 1996 (FCRA)p. 282
Children's Online Privacy Protection Act of 1998 (COPPA)p. 283
Health Insurance Portability and Accountability Act (HIPPA) [August 21, 1996]p. 283
Pervasive Computingp. 283
Wireless Mobile Computingp. 284
Evolving Securityp. 284
Basic Encryptionp. 285
WEPp. 285
Protecting Accessp. 285
Denial of Service Attacksp. 286
Evolving Standardsp. 286
Competing Standardsp. 287
Enhancing Your Wireless Securityp. 289
Biometricsp. 290
Assessing WLAN Strengths and Weaknessesp. 290
Combining Future WLAN Technologyp. 291
Smart Systemsp. 292
Scrambled Datap. 292
OS Platform Evolutionp. 292
Windows XP Securityp. 293
Macintosh OS Xp. 294
Palm and PocketPCp. 294
Linuxp. 294
Lindows OSp. 295
Preventing Network Intrusion Attemptsp. 295
Network Serversp. 296
File Serversp. 296
Printer Serversp. 297
Conclusion: The Future of Wireless Networkingp. 297
Indexp. 299
Table of Contents provided by Syndetics. All Rights Reserved.