The Foundation

The Foundation

Before continuing, you should have a good understanding of the principles of security, development, and management. The security principles are Authentication, Access Control and Authorization, Nonrepudiation, Privacy and Confidentiality, Integrity, and Auditing. The development principles are Functionality, Utility, Usability, Efficiency, Maintainability, Scalability, and Testability. The management principles are Schedule, Cost, Marketability, and Margin.

You should also understand the I-ADD security analysis phases of Identify, Analyze, Define, and Design and that they are iterative processes that can be used recursively to divide a system into its basic functional blocks. These blocks are then analyzed, and the results are returned back up through the process until a complete system design or analysis is performed.

This provides you with the background necessary to understand the security issues covered in latter parts of this book. We will now be able to talk specifically about security issues of wireless systems and will go through the process described here on portions of actual wireless systems in use today. This chapter gives you an even foundation on which to build your understanding of wireless security.

 



Wireless Security and Privacy(c) Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques
ISBN: 0201760347
EAN: 2147483647
Year: 2002
Pages: 73

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net