Table of Contents


caution! wireless networking: preventing a data disaster
Caution! Wireless Networking: Preventing a Data Disaster
byJack McCullough ISBN:076457213X
John Wiley & Sons 2004 (268 pages)

Written in non-technical language that's perfect for both novices and intermediate users, this no-nonsense guide is for wireless home networkers who want to protect their data from hackers, crackers, viruses, and worms.

Table of Contents
Caution! Wireless Networking—Preventing a Data Disaster
Introduction
Part I - Understanding the Threat
Chapter 1 - A Brief Overview of Wi-Fi
Chapter 2 - Network Fundamentals and Security Concerns
Chapter 3 - The People Behind the Problem
Chapter 4 - Hijacking Wi-Fi
Chapter 5 - More Wireless Attacks
Chapter 6 - Wardriving
Chapter 7 - Viruses and Wi-Fi
Part II - Protecting Yourself
Chapter 8 - Technical Pitfalls and Solutions
Chapter 9 - Wireless Privacy Concerns
Chapter 10 - Encryption and Wi-Fi
Chapter 11 - Securing Your WLAN
Chapter 12 - Protecting Your Wi-Fi Data
Appendix A - Suppliers, Manufacturers, and Resources
Appendix B - Wireless Standards
Glossary
Index
List of Figures
List of Tables
List of Sidebars


Calm down. There are definite dangers associated with wireless networking, but you hold the antidote in your hands. This guide, written by a respected security consultant, separates the genuine threats from the hype and hysteria. Then it tells you how to guard against virus attacks, hackers and crackers, rogue access points, drive-by downloads, sniffers, wardrivers, and other very real threats. By following the advice in these pages, you can make your Wi-Fi network as safe as it can be.

  • Understand how Wi-Fi works and what makes it vulnerable
  • Take a look inside the hacker community and see what makes them tick
  • Learn to recognize specific attacks
  • Check your system for weaknesses crackers can exploit
  • Hide your network from unwanted snoops and hackers by changing default settings and using encryption
  • Be able to identify hoaxes and see why they make you vulnerable
  • Guard your hardware with electrical protection, proper grounding, and regular maintenance
  • Deal with common Wi-Fi problems, such as multipath interference and overlapping channels
  • Protect your privacy from spyware, ISP monitoring, and other invaders

About the Author

Jack McCullough is founding consultant of Razorwire Information Security Consulting and a highly respected IT network and security expert. He has been the subject of frequent interviews with Ziff Davis Publications, Information Security Magazine, National Public Radio, and NBC new affiliates.



Caution! Wireless Networking—Preventing a Data Disaster

Jack McCullough

Caution! Wireless Networking: Preventing a Data Disaster

Published by
Wiley Publishing, Inc.
111 River Street
Hoboken, N.J. 07030
www.wiley.com

Copyright © 2004 by Wiley Publishing, Inc., Indianapolis, Indiana

Published by Wiley Publishing, Inc., Indianapolis, Indiana

Published simultaneously in Canada

Library of Congress Cataloging-in-Publication Data

ISBN: 0-7645-7213-X

Manufactured in the United States of America

10 9 8 7 6 5 4 3 2 1

1MA/SS/QZ/QU/IN

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, E-Mail: brandreview@wiley.com.

For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

Trademarks: Wiley and the Wiley Publishing logo are trademarks or registered trademarks of John Wiley and Sons, Inc. and/or its affiliates. All other trademarks are the property of their respective owners. Wiley Publishing, Inc. is not associated with any product or vendor mentioned in this book.

LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEB SITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OF WEB SITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEB SITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.

About the Author

Jack McCullough is the managing director of Razorwire Information Security Consulting. His technical expertise includes wireless and wired networks, computer security, physical security, programming, cryptography, and technical curriculum development. Jack’s background includes ten years of experience in the IT field. He has held positions as IT director, operations manager, network administrator, programmer, and software trainer. A respected IT and security authority, he is frequently sought out for informational interviews by both broadcast and print media services.

Jack has authored books, magazine articles, and white papers on computer security; his written works have been translated into several languages. Many universities have used his books and white papers in information security courses, as have the governments of Australia, the Peoples Republic of China, Japan, Brazil, and Taiwan. Jack continues to actively research information security, discover new ways to exploit the weaknesses in networked systems, and determine best practices that enable the average computer user to address these threats in an efficient manner.

When he isn’t writing about or researching technology, Jack teaches karate and self-defense under the watchful eyes of Sensei Floyd Burk, and Sensei Martha Burk at the Alpine Karate Academy in Alpine, California, and practices writing about himself in third-person.

Credits

Acquisitions Editor
Mike Roney

Project Editor
Cricket Krengel

Technical Editor
Greg Guntle

Copy Editor
Kim Heusel

Editorial Manager
Robyn Siesky

VP & Publisher
Barry Pruett

Vice President & Group
Executive Publisher
Richard Swadley
Project Coordinator
Maridee Ennis

Graphics and Production Specialists
Karl Brandt
Jonelle Burns
Amanda Carter
Carrie A. Foster
Lauren Goddard
Jennifer Heleine

Quality Control Technicians
Susan Moritz
Carl William Pierce
Brian H. Walls

Proofreading
Christine Sabooni

Indexing
Johnna VanHoose

To Cathy, for her support during this and all of my other projects.

Acknowledgments

It takes a lot of exceptional people to complete a project like this. First and fore- most, a big thank you goes to my literary agent, David Fugate of Waterside productions, arguably the best agent working for technical authors today. I want to thank Mike Roney for sharing his vision for the book and hiring me to write it, and my development editor, Cricket Krengel, who expertly guided me through preparing this manuscript and put so much work into editing it — especially after the vision of the title changed and we had to rethink several chapters. Finally, thanks to the layout and production team at Wiley for putting this book together and for interpreting my scribbles into actual art that the reader can understand.