Hackproofing Your Wireless Network
Home > Computing and Information Technology > Computer networking and communications > Network security > Hackproofing Your Wireless Network
Hackproofing Your Wireless Network

Hackproofing Your Wireless Network


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

The only way to stop a hacker is to think like one! Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment. Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to the implementation of security policies, plans, and recovery protocols, this book will help users secure their wireless network before its security is compromised. The only way to stop a hacker is to think like one...this book details the multiple ways a hacker can attack a wireless network - and then provides users with the knowledge they need to prevent said attacks.

Table of Contents:
Foreword Chapter 1 The Wireless Challenge Introduction Wireless Technology Overview Defining Cellular-based Wireless Defining the Wireless LAN The Convergence of Wireless Technologies Trends and Statistics Understanding the Promise of Wireless Wireless Networking Understanding the Benefits of Wireless Convenience Affordability Speed Aesthetics Productivity Facing the Reality of Wireless Today Standards Conflicts Commercial Conflicts Market Adoption Challenges The Limitations of “Radio” The Limitations of Wireless Security Examining the Wireless Standards Cellular-based Wireless Networks Wireless LAN Networks Understanding Public Key Infrastructures and Wireless Networking Summary Solutions Fast Track Frequently Asked Questions Chapter 2 A Security Primer Introduction Understanding Security Fundamentals and Principles of Protection Ensuring Confidentiality Ensuring Integrity Ensuring Availability Ensuring Privacy Ensuring Authentication Ensuring Authorization Ensuring Non-repudiation Accounting and Audit Trails Using Encryption Reviewing the Role of Policy Identifying Resources Understanding Classification Criteria Implementing Policy Recognizing Accepted Security and Privacy Standards Reviewing Security Standards Reviewing Privacy Standards and Regulations Addressing Common Risks and Threats Experiencing Loss of Data Experiencing Denial and Disruption of Service Eavesdropping Preempting the Consequences of an Organization’s Loss Summary Solutions Fast Track Frequently Asked Questions Chapter 3 Wireless Network Architecture and Design Introduction Fixed Wireless Technologies Multichannel Multipoint Distribution Service Local Multipoint Distribution Services Wireless Local Loop Point-to-Point Microwave Wireless Local Area Networks Why the Need for a Wireless LAN Standard? Developing WLANs through the 802.11 Architecture The Basic Service Set The Extended Service Set The CSMA-CA Mechanism Configuring Fragmentation Using Power Management Options Multicell Roaming Security in the WLAN Developing WPANs through the 802.15 Architecture Bluetooth HomeRF High Performance Radio LAN Mobile Wireless Technologies First Generation Technologies Second Generation Technologies 2.5G Technology Third Generation Technologies Wireless Application Protocol Global System for Mobile Communications General Packet Radio Service Short Message Service Optical Wireless Technologies Exploring the Design Process Conducting the Preliminary Investigation Performing Analysis of the Existing Environment Creating a Preliminary Design Finalizing the Detailed Design Executing the Implementation Capturing the Documentation Creating the Design Methodology Creating the Network Plan Developing the Network Architecture Reviewing and Validating the Planning Phase Creating a High-Level Topology Creating a Collocation Architecture Defining the High-Level Services Formalizing the Detailed Design Phase Understanding Wireless Network Attributes from a Design Perspective Application Support Physical Landscape Network Topology Summary Solutions Fast Track Frequently Asked Questions Chapter 4 Common Attacks and Vulnerabilities Introduction The Weaknesses in WEP Criticisms of the Overall Design Weaknesses in the Encryption Algorithm Weaknesses in Key Management Weaknesses in User Behavior Conducting Reconnaissance Finding a Target Finding Weaknesses in a Target Exploiting Those Weaknesses Sniffing, Interception, and Eavesdropping Defining Sniffing Sample Sniffing Tools Sniffing Case Scenario Protecting Against Sniffing and Eavesdropping Spoofing and Unauthorized Access Defining Spoofing Sample Spoofing Tools Spoofing Case Scenario Protecting Against Spoofing and Unauthorized Attacks Network Hijacking and Modification Defining Hijacking Sample Hijacking Tools Hijacking Case Scenario Protection against Network Hijacking and Modification Denial of Service and Flooding Attacks Defining DoS and Flooding Sample DoS Tools DoS and Flooding Case Scenario Protecting Against DoS and Flooding Attacks The Introduction of Malware Stealing User Devices Summary Solutions Fast Track Frequently Asked Questions Chapter 5 Wireless Security Countermeasures Introduction Revisiting Policy Addressing the Issues with Policy Analyzing the Threat Threat Equals Risk Plus Vulnerability Designing and Deploying a Secure Network Implementing WEP Defining WEP Creating Privacy with WEP The WEP Authentication Process WEP Benefits and Advantages WEP Disadvantages The Security Implications of Using WEP Implementing WEP on the Aironet Implementing WEP on the ORiNOCO AP-1000 Securing a WLAN with WEP: A Case Scenario Filtering MACs Defining MAC Filtering MAC Benefits and Advantages MAC Disadvantages Security Implications of MAC Filtering Implementing MAC Filters on the AP-1000 Implementing MAC Filters on the Aironet 340 Filtering MAC Addresses: A Case Scenario Filtering Protocols Defining Protocol Filters Protocol Filter Benefits and Advantages Protocol Filter Disadvantages Security Implications of Using Protocol Filters Using Closed Systems and Networks Defining a Closed System Closed System Benefits and Advantages Closed System Disadvantages Security Implications of Using a Closed System A Closed Environment on a Cisco Aironet Series AP A Closed Environment on an ORiNOCO AP-1000 Implementing a Closed System: A Case Scenario Enabling WEP on the ORiNOCO Client Allotting IPs Defining IP Allocation on the WLAN Deploying IP over the WLAN: Benefits and Advantages Deploying IP over the WLAN: Disadvantages Security Implications of Deploying IP over the WLAN Deploying IP over the WLAN: A Case Scenario Using VPNs VPN Benefits and Advantages VPN Disadvantages Security Implications of Using a VPN Layering Your Protection Using a VPN Utilizing a VPN:A Case Scenario Securing Users End User Security Benefits and Advantages End User Security Disadvantages User Security: A Case Scenario Summary Solutions Fast Track Frequently Asked Questions Chapter 6 Circumventing Security Measures Introduction Planning and Preparations Finding a Target Detecting an Open System Detecting a Closed System Exploiting WEP Security of 64-bit versus 128-bit Keys Acquiring a WEP Key War Driving What Threat Do These “Open Networks” Pose to Network Security? Stealing User Devices What Are the Benefits of Device Theft? MAC Filtering Determining MAC Filtering Is Enabled MAC Spoofing Bypassing Advanced Security Mechanisms Firewalls What Happens Now? Exploiting Insiders Installing Rogue Access Points Where Is the Best Location for a Rogue AP? Configuring the Rogue AP Risks Created by a Rogue AP Are Rogue APs Detectable? Exploiting VPNs Summary Solutions Fast Track Frequently Asked Questions Chapter 7 Monitoring and Intrusion Detection Introduction Designing for Detection Starting with a Closed Network Ruling Out Environmental Obstacles Ruling Out Interference Defensive Monitoring Considerations Availability and Connectivity Monitoring for Performance Intrusion Detection Strategies Integrated Security Monitoring Popular Monitoring Products Conducting Vulnerability Assessments Incident Response and Handling Policies and Procedures Reactive Measures Reporting Cleanup Prevention Conducting Site Surveys for Rogue Access Points The Rogue Placement Summary Solutions Fast Track Frequently Asked Questions Chapter 8 Auditing Introduction Designing and Planning a Successful Audit Types of Audits When to Perform an Audit Auditing Activities Auditing Tools Critical Auditing Success Factors Defining Standards Standards Guidelines Best Practices Policies Procedures Auditing, Security Standards, and Best Practices Corporate Security Policies Auditing Charters and Irregularities Establishing the Audit Scope Establishing the Documentation Process Performing the Audit Auditors and Technologists Obtaining Support from IS/IT Departments Gathering Data Analyzing Audit Data Matrix Analysis Recommendations Reports Generating Audit Reports The Importance of Audit Report Quality Writing the Audit Report Final Thoughts on Auditing Sample Audit Reports Summary Solutions Fast Track Frequently Asked Questions Chapter 9 Case Scenarios Introduction Implementing a Non-secure Wireless Network Implementing an Ultra-secure Wireless LAN Physical Location and Access Configuring the AP Designing Securely Securing by Policy Taking a War Drive Scouting Your Location Installing in Difficult Situations Developing a Wireless Security Checklist Minimum Security Moderate Security Optimal Security Summary Solutions Fast Track Frequently Asked Questions Appendix: Hack Proofing Your Wireless Network Fast Track Index


Best Sellers


Product Details
  • ISBN-13: 9781928994596
  • Publisher: Syngress Media,U.S.
  • Publisher Imprint: Syngress Media,U.S.
  • Height: 244 mm
  • No of Pages: 608
  • Width: 175 mm
  • ISBN-10: 1928994598
  • Publisher Date: 22 Mar 2002
  • Binding: Paperback
  • Language: English
  • Weight: 1050 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Hackproofing Your Wireless Network
Syngress Media,U.S. -
Hackproofing Your Wireless Network
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Hackproofing Your Wireless Network

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!