Wireless Operational SecurityThis comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap. *Presents a new "WISDOM" model for Wireless Security Infrastructures *Acts as a critical guide to implementing "Converged Networks" wired/wireless with all necessary security considerations *Rittinghouse's Cybersecurity Operations Handbook is the only security book recommended by the FCC |
Contents
Section IGeneral Network Security I | 1 |
Managing Access | 23 |
Setting Up Defenses | 47 |
Copyright | |
15 other sections not shown
Other editions - View all
Wireless Operational Security John Rittinghouse, PhD, CISM,James F. Ransome, PhD, CISM, CISSP Limited preview - 2004 |
Common terms and phrases
ABC Inc ABC Inc.'s Access Control access point administrators algorithm allow application attack audit authentication server communications configuration connection corporate cryptographic database decrypt default detection devices DHCP digital certificate e-mail EAP-TLS employees encryption ensure environment firewall function gateway hacker hardware hash host implementation incident information system InfoSec infrastructure integrity interface Internet intrusion IP address IPSec Kerberos L2TP L2TP/IPSec Layer LDAP MAC address mobile monitoring organization packet password PPTP protect protocol public key RADIUS server Retrieved August 23 risk rogue router Secure Shell security policy security solution session SNMP specific spoofing SSID standard system security TCP Wrappers threats tion TKIP traffic tunnel types unauthorized access USA Patriot Act user authentication vendors vulnerabilities WEP key wired network wireless client wireless network WLAN WLAN security
References to this book
Advances in Enterprise Information Technology Security Khadraoui, Djamel,Herrmann, Francine No preview available - 2007 |