Wireless Security Handbook examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker.
Features:
- Provides a well-rounded overview of wireless network security
- Describes wireless physical layer technologies and management frames
- Covers the wireless deployment process, access points, and antenna theory
- Reviews the various 802.11 LAN standards as well as those of Personal Area Network (PAN) 802.15
- Examines wide area wireless technologies and standards including cell phone, GPS, 802.16 Air Interface, and 802.20
- Discusses aspects of wireless LAN security such as authentication, SSID, WEP, 802.1x, RADIUS, and more
- Analyzes scanning, sniffing, hybrid, denial-of-service, cracking, and access point attacking tools
Contents
Wireless Network Overview
- RF Overview
- Wireless Signal Propagation
- Signal-to-Noise Ratio
- Modulation
- Wireless Groups
Risks and Threats of Wireless
- Goals of Information Security
- Analysis
- Spoofing
- Denial of Service
- Malicious Code
- Social Engineering
- Rogue Access Points
- Cell Phone Security
- Wireless Hacking and Hackers
- RFID
The Legality of Computer Crime
- Electronic Communications Privacy Act
- Computer Fraud and Abuse Act
- State Computer Crime Issues
Wireless Physical Layer Technologies
- ISM Spectrum
- Frequency Hopping Spread Spectrum (FHSS)
- Direct Sequence Spread Spectrum (DSSS)
- Orthogonal Frequency Division Multiplexing (OFDM)
Wireless Management Frames
- Beacon
- Probe Request
- Probe Response
- Authentication
- Association Request
- Association Response
- Disassociation and De-Authentication
- CSMA/CA
- Fragmentation
- Distributed Coordination Function
- Point Coordination Function
- Interframe Spacing
- Service Set Identifier (SSID)
Wireless Local and Personal Area Networks
- Ad Hoc Mode
- Infrastructure Mode
- Bridging
- Repeater
- Mesh Wireless Networks
- Local Area Networking Standards
- Personal Area Network (PAN) 802.15
Wide Area Wireless Technologies
- Cell Phone Technologies
- GPS
- 802.16 Air Interface Standard
- 802.20 Standard
Wireless Antenna Theory
- RF Antenna Overview
- Fresnel Zone
- Antenna Types
- Connectors
The Wireless Deployment Process
- Gather Requirements
- Estimation
- Make the Business Case
- Site Survey
- Design
- Staging
- Deployment and Installation
- Certification
- Audit
Wireless Access Points
- Linksys Access Points
- Cisco Access Points
Wireless End Devices
- Laptops
- Tablets
- PDA Devices
- Handheld Scanners
- Smart Phones
- Wi-Fi Phones
Wireless LAN Security
- Wireless LAN Security History
- Authentication
- SSID
- Wireless Security Basics
- Equivalent Privacy Standard (WEP)
- 802.1x
- Remote Authentication Dial-In User Service (RADIUS)
- Extensible Authentication Protocol (EAP)
- Wi-Fi Protected Access (WPA)
- 802.11i
- Wi-Fi Protected Access (WPA2)
- WLAN Authentication and Privacy Infrastructure (WAPI)
- Rogue Access Points Detection
Breaking Wireless Security
- The Hacking Process
- Wireless Network Compromising Techniques
- Access Point Compromising Techniques
Wireless Security Policy
- Policy Overview
- The Policy-Writing Process
- Risk Assessment
- Impact Analysis
- Wireless Security Policy Areas
Wireless Security Architectures
- Static WEP Wireless Architecture
- VPN
- Wireless VPN Architecture Overview
- VPN Policy Aspect
- Wireless Gateway Systems
- 802.1x
- Comparing Wireless Security Architectures
Wireless Tools
- Scanning Tools
- Sniffing Tools
- Hybrid Tools
- Denial-of-Service Tools
- Cracking Tools
- Access Point Attacking Tools
- Other Wireless Security Tools
Index