Flylib.com
Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Table of Contents
BackCover
Wireless Operational Security
Foreword
Preface
Section I: General Network Security
Chapter 1: Basic Concepts
1.1 Threats to Personal Privacy
1.2 Fraud and Theft
1.3 Internet Fraud
1.4 Employee Sabotage
1.5 Infrastructure Attacks
1.6 Malicious Hackers
1.7 Malicious Coders
1.8 Industrial Espionage
1.9 Social Engineering
1.10 Privacy Standards and Regulations
1.11 Endnotes
Chapter 2: Managing Access
2.2 Password Management
2.3 Endnotes
Chapter 3: Setting up Defenses
3.2 Defense-in-Depth Strategy
3.3 The Common Criteria Model
3.4 Security Architecture
3.5 Operations Security
3.6 Host-Based Intrusion Detection
3.7 Network-Based Intrusion Detection Efforts
3.8 Endnotes
Chapter 4: Incident Management
4.2 Incident Handling Process Overview
4.3 Endnotes
Chapter 5: Securing Web Applications
5.2 Endnotes
Chapter 6: Security and the Law
6.2 President s Executive Order on Critical Infrastructure Protection
6.3 The USA Patriot Act of 2001
6.4 The Homeland Security Act of 2002
6.5 Changes to Existing Laws
6.6 Investigations
6.7 Ethics
6.8 Endnotes
Section II: Wireless Network Security
Chapter 7: Wireless Networking Basics
7.2 Mobile Security
7.3 Encryption Schemes in WLANs
7.4 Endnotes
Chapter 8: WLAN Policy and Risk Management
8.1 Purpose and Goals of WLAN Security Policies
8.2 Basic Approach to WLAN Security and Policy Development
8.3 WLAN Risk Management
8.4 Risks to Wired Networks From Wireless Networks
8.5 Security Issues for Wireless Public-Access Network Use
8.6 Sample WLAN Security Checklist
8.7 Creating WLANs in Public Space
8.8 Designs for Scalable and Secure WLAN Solutions
8.9 Endnotes
Chapter 9: WLAN Intrusion Process
9.2 Social Engineering
9.3 Searching Publicly Available Resources
9.4 War-Driving, -Walking, -Flying, and -Chalking
9.5 Exploitable WLAN Configurations
9.6 How Intruders Obtain Network Access to a WLAN
9.7 Password Gathering and Cracking Software
9.8 Share Enumerators
9.9 Using Antennas and WLAN Equipment
9.10 Denial-of-Service Attacks and Tools
9.11 Rogue Devices as Exploitation Tools
9.12 Other Useful Tools and Techniques
9.13 Use of Malicious Code or File Insertion in WLANs
9.14 Security Vulnerabilities with Public-Access Wireless Networks
9.15 Weaknesses in Existing Security Solutions
9.16 Endnotes
Chapter 10: WLAN Risk and Threat Mitigation
10.2 Using Dynamic WEP (802.1x and EAP) to Address Authentication and Encryption Flaws in 802.11
10.3 VPNs in a WLAN Environment
10.4 Enhancing WLAN Security
10.5 Other WLAN Security Issues
10.6 Conclusion
10.7 Endnotes
Chapter 11: Additional WLAN Security Solutions
11.2 Security Advantages of Thin Clients in a Wireless Environment
11.3 Using DHCP Services for Authentication
11.4 Baselining
11.5 Using Kerberos, RADIUS, and LDAP for WLAN Authentication
11.6 Multifactor Authentication
11.7 802.11i and WiFi Protected Access
11.8 Conclusion
11.9 Endnotes
Chapter 12: WISDOM for WLAN Practitioners
12.2 Costs of Securing WLANs
12.3 WLAN Threat and Impact Analysis
12.4 WLAN Security Management Considerations
12.5 Applying WISDOM to WLAN Security
12.6 Conclusion
12.7 Endnotes
Glossary
B-C
D
E-G
H-I
K-M
N-P
Q-S
T
U-W
Appendix A: Wireless Policy Essentials
A.2 ABC Inc. InfoSec Risk Assessment Policy
A.3 ABC Inc. InfoSec Audit Policy
A.4 ABC Inc. InfoSec Acceptable Use Policy
A.5 ABC Inc. InfoSec Network Policy
A.6 ABC Inc. InfoSec De-Militarized Zone (DMZ) Policy
A.7 ABC Inc. InfoSec Router Policy
A.8 ABC Inc. InfoSec Extranet Policy
A.9 ABC Inc. InfoSec Remote Access Policy
A.10 ABC Inc. InfoSec Dial-In Access Policy
A.11 ABC Inc. InfoSec VPN Communication Policy
A.12 ABC Inc. InfoSec Wireless Communication Policy
A.13 ABC Inc. InfoSec Server Policy
A.14 ABC Inc. InfoSec Password Policy
A.15 ABC Inc. InfoSec Application Password Policy
A.16 ABC Inc. InfoSec Anti-Virus Policy
A.17 ABC Inc. InfoSec Policy Exception Form
Appendix B: Wireless-Related Legislative Links
Appendix C: Additional WLAN References
C.2 Security Risks and Legal Protections Recap
C.3 Endnotes
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Image Processing with LabVIEW and IMAQ Vision
CMOS Image Sensors
Color Images
Frame Grabbing
Gray-Scale Operations
Quantitative Analysis
C++ How to Program (5th Edition)
Another C++ Program: Adding Integers
Summary
Using Structures with Functions
Multiple Inheritance and virtual Base Classes
M.1. Introduction
MySQL Cookbook
Working with NULL Values
Sorting Dotted-Quad IP Values in Numeric Order
Performing Validity Checking on Date or Time Subparts
Epilog
Enumerating a Many-to-Many Relationship
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 7. Will the Kids Barf?
Hack 40. Plot Points on a Spinning Globe Applet
How GPS Works
Conclusion
Hack 79. Geocode a U.S. Street Address
Programming Microsoft ASP.NET 3.5
Working with the Page
ASP.NET Mobile Controls
Working with Images in ASP.NET
Hosting ASP.NET Outside IIS
Index
Special Edition Using FileMaker 8
FileMaker Extra: Designing Cross-PlatformFriendly Layouts
Audit Trails in FileMaker Pro
FileMaker Extra: User Interface Heuristics
Pre-Conversion Tasks
FileMaker Extra: Exploiting the FileMaker-to-FileMaker Import
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies