1st Edition

Wireless Security Handbook

By Aaron E. Earle Copyright 2006
    382 Pages 105 B/W Illustrations
    by Auerbach Publications

    The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network.

    This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook also offers the technical details of how you can design, build, and hack nearly all wireless security components.

    This volume also helps advance your career by covering all of the objectives of the three widely recognized wireless certifications--those administered by Planet3 Wireless and Cisco Systems. The book focuses on the wireless local area networking technologies that help you meet these objectives, while also analyzing almost all other facets of mobile communications.

    Wireless Network Overview
    RF Overview
    Wireless Signal Propagation
    Signal-to-Noise Ratio
    Modulation
    Wireless Groups

    Risks and Threats of Wireless
    Goals of Information Security
    Analysis
    Spoofing
    Denial of Service
    Malicious Code
    Social Engineering
    Rogue Access Points
    Cell Phone Security
    Wireless Hacking and Hackers
    RFID

    The Legality of Computer Crime
    Electronic Communications Privacy Act
    Computer Fraud and Abuse Act
    State Computer Crime Issues

    Wireless Physical Layer Technologies
    ISM Spectrum
    Frequency Hopping Spread Spectrum (FHSS)
    Direct Sequence Spread Spectrum (DSSS)
    Orthogonal Frequency Division Multiplexing (OFDM)

    Wireless Management Frames
    Beacon
    Probe Request
    Probe Response
    Authentication
    Association Request
    Association Response
    Disassociation and De-Authentication
    CSMA/CA
    Fragmentation
    Distributed Coordination Function
    Point Coordination Function
    Interframe Spacing
    Service Set Identifier (SSID)

    Wireless Local and Personal Area Networks
    Ad Hoc Mode
    Infrastructure Mode
    Bridging
    Repeater
    Mesh Wireless Networks
    Local Area Networking Standards
    Personal Area Network (PAN) 802.15

    Wide Area Wireless Technologies
    Cell Phone Technologies
    GPS
    802.16 Air Interface Standard
    802.20 Standard

    Wireless Antenna Theory
    RF Antenna Overview
    Fresnel Zone
    Antenna Types
    Connectors

    The Wireless Deployment Process
    Gather Requirements
    Estimation
    Make the Business Case
    Site Survey
    Design
    Staging
    Deployment and Installation
    Certification
    Audit

    Wireless Access Points
    Linksys Access Points
    Cisco Access Points

    Wireless End Devices
    Laptops
    Tablets
    PDA Devices
    Handheld Scanners
    Smart Phones
    Wi-Fi Phones

    Wireless LAN Security
    Wireless LAN Security History
    Authentication
    SSID
    Wireless Security Basics
    Equivalent Privacy Standard (WEP)
    802.1x
    Remote Authentication Dial-In User Service (RADIUS)
    Extensible Authentication Protocol (EAP)
    Wi-Fi Protected Access (WPA)
    802.11i
    Wi-Fi Protected Access (WPA2)
    WLAN Authentication and Privacy Infrastructure (WAPI)
    Rogue Access Points Detection

    Breaking Wireless Security
    The Hacking Process
    Wireless Network Compromising Techniques
    Access Point Compromising Techniques

    Wireless Security Policy
    Policy Overview
    The Policy-Writing Process
    Risk Assessment
    Impact Analysis
    Wireless Security Policy Areas

    Wireless Security Architectures
    Static WEP Wireless Architecture
    VPN
    Wireless VPN Architecture Overview
    VPN Policy Aspect
    Wireless Gateway Systems
    802.1x
    Comparing Wireless Security Architectures

    Wireless Tools
    Scanning Tools
    Sniffing Tools
    Hybrid Tools
    Denial-of-Service Tools
    Cracking Tools
    Access Point Attacking Tools
    Other Wireless Security Tools

    Appendix A: Review Question Answers

    Biography

    Aaron E. Earle