This book is written principally for system administrators but will also be useful to technically oriented home users and design
System administrators have been
If you are a design engineer in any networking field, wireless or
If you are just
We assume that you have a reasonable understanding of how computer networks
This book is organized into three parts. Roughly speaking, these
In Part I, "What Everyone Should Know," we review issues that everybody should know about security. Some of these issues are commonsense, but you may not have thought about them. If you are already a security expert and exploring how security works for Wi-Fi, consider skimming this material because many of the principles will be familiar.
Part II, "The Design of Wi-Fi Security," starts with a primer on IEEE 802.11 that runs through the basics of Wi-Fi systems communication. It describes the types of messages that are exchanged, usually hidden from the end
After the primer, the book delves into the security protocols for Wi-Fi. It describes the original Wi-Fi security approach, WEP, and explains why this method is no longer
Part III, "Wi-Fi Security in the Real World," returns to practical issues. We start off with a review of security in hotspots or public access networks. Such network access is becoming increasingly popular in Internet cafes and airports; and hotspots bring their own special security risks. We then look at some of the tools available on the Web that
We have not focused on specific vendor products. In the end each vendor will package the new security approaches in its own way. They will hide the complexity behind graphical user interfaces and try to simplify the installation and maintenance as much as possible. All this can make life easy for you if you are deploying the equipment. However, while the work required to install systems can be boiled down, we believe that the understanding of what is going on should be sharpened up. Why? Because at the end of the day, you're the one that gets hurt by attacks, not the vendor.
There is no "neighborhood watch" scheme for network security. The administrator or owner of the equipment must be aware of the risks and be proactive in response. Of course most people can't afford, and don't want, to
Our advice to you is simple: Be informed. Take advantage of vendor tools to simplify installation and management but understand what they are doing. Know enough to decide what is best for you and to tweak under the hood when you think it is necessary. Make better purchasing decisions and sleep well at night. Helping you meet these goals is the purpose of this book.