Index_W


W

War-chalking, 194 “95
War-dialing, 194
War-driving, 194
War-flying, 195
Warning banners, 170
Web applications security, 85 “93
application-based attacks, 86
application layer standards, 91
code reviews, 92
data link layer standards, 91
development, 85 “93
enforcement techniques, 92 “93
feature standardization, 90 “91
patching, 93
portability, 86
secure code design, 92
secure configuration, 92
testing for loopholes, 92 “93
transport and network layer standards, 91
Web-based attacks, 87 “90
Web-based attacks, 87 “90
backdoors, 90
configuration subversion, 90
cookie poisoning , 88 “89
forceful browsing, 89 “90
hidden manipulation, 87 “88
method, 87
parameter tampering, 88
stealth commanding , 89
vendor-assisted hacking, 90
WEP, 125, 224
cracking, 224
decryption tools, 201
dynamic, 227 “40
effectiveness, 224
LEAP benefits over, 330
using, 226 “27
weaknesses, 225 “26
Wide Area Networks (WANs), 49
WiFi Protected Access (WPA), 125, 223, 302 “5
authentication, 304
backward compatibility, 303
defined, 302
features, 303 “5
introduction, 303
key management, 304
MIC, 304
mixed-mode deployment, 304 “5
TKIP, 303 “4
upgrades, 303
Win32.Sobig.F worm, 172 “74
Windows NT L0phtCrack, 41
Windows Security Access Manager (SAM), 207
WinSniffer, 205 “6
Wired Equivalent Privacy. See WEP
Wireless bridges, 214 “15
Wireless cards, 210
Wireless Integrated Secure Data Options Model. See WISDOM
Wireless LANs. See WLANs
Wireless Personal Area Networks (WPANs), 123
Wireless protocol analyzers, 208 “9
Wireless public-access networks, 182 “83
recommendations, 182 “83
security issues, 182 “83
security vulnerabilities, 220 “21
Wireless Robust Authenticated Protocol (WRAP), 302 “3
Wiretapping procedures, 103
WISDOM, 309 “56
applying, 315 “55
defined, 115, 309
WISDOM Advanced Security, 343 “55
ARP spoofing, 354
client's WLAN without IPSec protection, 349
connectivity to Internet services, 347 “48
defined, 343
design features, 348, 355
DHCP IP configuration protocol spoofing, 352
DNS and DHCP server application protocols, 349
IP spoofing, 353
MAC/IP spoofing from unauthenticated users, 355
man-in-the-middle attacks, 351
password attacks, 354
requirements, 343
topology, 348
unauthorized network topology discovery, 355
VPN appliance use, 344
wireless packet sniffers against WLAN clients , 350
WISDOM Basic Security, 315 “28
AP ad hoc mode, 319
AP administrative password, 320
AP channel cross-over, 322
AP default setting of "no encryption," 317
AP default shared key, 321
AP Ethernet MAC ACLs, 318
AP placement, 320
AP reset function, 321
AP shared key authentication, 317
AP SSID broadcast, 316
AP user password, 319
bridge-to-bridge eavesdropping, 323
defined, 315
DHCP server, 328
elements, 316 “28
encryption key length, 322
features, 315
filtering controls, 326
MAC spoofing, 324
rogue access points, 325
security patches/upgrades, 327
SNMP agents , 327
topology, 316
WLAN eavesdropping, 322
WISDOM Intermediate Security, 328 “43
AP user password, 334
ARP spoofing, 341
broadcast monitoring, 338
cleartext WEP IV, 336
defined, 328
design features, 331 “32
elements, 333 “43
IP spoofing, 340
man-in-the-middle attacks, 343
password attack, 333
RC4 encryption key weaknesses, 337
replay attacks against WEP, 339
static MAC addresses, 334
static WEP key, 335
topology, 329, 332
unauthenticated access, 334
unauthorized access, 334
unauthorized network topology discovery, 341
vendor-neutral solution, 328
WEP cryptographic integrity, 337
WEP integrity and confidentiality attacks, 333
WEP IV weaknesses, 335
WEP vulnerabilities elimination , 331
wireless packet sniffers, 342
WLANs, 117 “28
accessing, 119
advantages, 120
attacks, 200 “201
audit and discovery tools, 196 “98
authentication, 283 “301
bandwidth, 119
Bluetooth, 123 “24
capacity, 127
components , 119
current standards, 121 “22
defined, 117
design solutions, 188
disadvantages, 121
encryption schemes, 150 “56
exploitable configurations, 199
functioning of, 119 “20
future standards, 122 “23
implementation concerns, 127 “28
intrusion process, 191 “222
intrusions, 115
malicious code/file insertion, 217 “20
network discovery tools, 198
networking utilities, 198 “99
performance, 126 “27, 128
planning, 127
power consumption, 128
power over Ethernet, 128
public-assess security issues, 182 “83
in public space, 187 “88
rate limitation, 270
risk management, 177 “81
security, 125 “26
security, enhancing, 260 “70
security checklist, 183 “87
security costs, 310 “12
security management considerations, 313 “15
security policies, 159 “77, 314 “15
security solution weaknesses, 221 “22
segmentation devices, 260 “67
subnet roaming, 270 “71
threat and impact analysis, 312
transmission speeds, 126
uses, 117 “18
UWB, 124
Worms, 218 “19



Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net