The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network.
This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook also offers the technical details of how you can design, build, and hack nearly all wireless security components.
This volume also helps advance your career by covering all of the objectives of the three widely recognized wireless certifications--those administered by Planet3 Wireless and Cisco Systems. The book focuses on the wireless local area networking technologies that help you meet these objectives, while also analyzing almost all other facets of mobile communications.
RF Overview
Wireless Signal Propagation
Signal-to-Noise Ratio
Modulation
Wireless Groups
Risks and Threats of Wireless
Goals of Information Security
Analysis
Spoofing
Denial of Service
Malicious Code
Social Engineering
Rogue Access Points
Cell Phone Security
Wireless Hacking and Hackers
RFID
The Legality of Computer Crime
Electronic Communications Privacy Act
Computer Fraud and Abuse Act
State Computer Crime Issues
Wireless Physical Layer Technologies
ISM Spectrum
Frequency Hopping Spread Spectrum (FHSS)
Direct Sequence Spread Spectrum (DSSS)
Orthogonal Frequency Division Multiplexing (OFDM)
Wireless Management Frames
Beacon
Probe Request
Probe Response
Authentication
Association Request
Association Response
Disassociation and De-Authentication
CSMA/CA
Fragmentation
Distributed Coordination Function
Point Coordination Function
Interframe Spacing
Service Set Identifier (SSID)
Wireless Local and Personal Area Networks
Ad Hoc Mode
Infrastructure Mode
Bridging
Repeater
Mesh Wireless Networks
Local Area Networking Standards
Personal Area Network (PAN) 802.15
Wide Area Wireless Technologies
Cell Phone Technologies
GPS
802.16 Air Interface Standard
802.20 Standard
Wireless Antenna Theory
RF Antenna Overview
Fresnel Zone
Antenna Types
Connectors
The Wireless Deployment Process
Gather Requirements
Estimation
Make the Business Case
Site Survey
Design
Staging
Deployment and Installation
Certification
Audit
Wireless Access Points
Linksys Access Points
Cisco Access Points
Wireless End Devices
Laptops
Tablets
PDA Devices
Handheld Scanners
Smart Phones
Wi-Fi Phones
Wireless LAN Security
Wireless LAN Security History
Authentication
SSID
Wireless Security Basics
Equivalent Privacy Standard (WEP)
802.1x
Remote Authentication Dial-In User Service (RADIUS)
Extensible Authentication Protocol (EAP)
Wi-Fi Protected Access (WPA)
802.11i
Wi-Fi Protected Access (WPA2)
WLAN Authentication and Privacy Infrastructure (WAPI)
Rogue Access Points Detection
Breaking Wireless Security
The Hacking Process
Wireless Network Compromising Techniques
Access Point Compromising Techniques
Wireless Security Policy
Policy Overview
The Policy-Writing Process
Risk Assessment
Impact Analysis
Wireless Security Policy Areas
Wireless Security Architectures
Static WEP Wireless Architecture
VPN
Wireless VPN Architecture Overview
VPN Policy Aspect
Wireless Gateway Systems
802.1x
Comparing Wireless Security Architectures
Wireless Tools
Scanning Tools
Sniffing Tools
Hybrid Tools
Denial-of-Service Tools
Cracking Tools
Access Point Attacking Tools
Other Wireless Security Tools
Appendix A: Review Question Answers
Biography
Aaron E. Earle