Index_S


S

SAP (Software Access Point), 254

satellite broadband, 253

scan lines, television, 126

scatternets, Bluetooth and, 19

SCR file extensions, viruses and, 107

script kiddies, 47–49

scytale, 171

secret key cryptography, failings, 173–174

security

antivirus software, 213

backup systems, 219–228

black hats, 46, 47

Blaster worm, 48

broadcast and, 10

broadcast parameters modification, 202–205

CERT Web site, vulnerabilities, 85

clients, 207–215

cyber vandalism, 48

data threat identification, 217–219

default settings and, 188–193

DHCP and, 193–197

DMZ (demilitarized zone), 210–211

encryption and, 10, 205–206

Ethernet networks, 8

firewall setup in XP, 208–210

gray hats, 47

hacktivists, 49–50

hosts, 207–215

IP addresses, 191–193

IP addresses, static, 195

known issues exploitation, 83–85

network traffic filtering, 197–202

password selection tips, 190–191

patches, 211–213

resource Web sites, 238–239

script kiddies, 47–49

services, disable unnecessary, 214–215

updates, 211–213

urban locations, 188

white hats, 46

WLAN vulnerabilities, 187–188

WPA firmware upgrades, 206

Server Service, 215

servers, overview, 4, 26

services

disable unnecessary, 214–215

networks, 26

theft, identification, 131–132

session hijacking

definition, 59

diagram flow charts, 62

DoS attacks, 61

MITM (man-in-the-middle) attacks, 61

public hotspots, 64–65

time outs and, 59

user sessions, 59

Session layer, OSI reference model, 29

SHS file extensions, viruses and, 107

signal jamming, DoS attack, 73–74

signal propagation, multipath, 126

signals, X10 device signal interception, 158–161

Simple File Sharing, vulnerabilities and, 81

site surveys, multipath interference and, 129

s’kiddiots, 47

slave devices, Bluetooth and, 18

SMTP (Simple Mail Transfer Protocol), ports, 78

sniffers

attenuation and, 85

NICs and, 87–88

software, 86–87

spoofing and, 60

social engineering, crackers and, 50, 55–56

software. See also firmware

ad-blocking, 153

backup software, 226–228

bot software, 116–117

malicious, 101

spy-blocking, 153

wardriving defense, 99

Web sites, 241–242

SOHO (small office/home office), 254

speed

attenuation, 8

data rate, 8

latency and, 8

throughput, 8

Wi-Fi versus Ethernet, 6

spoofing

blended attacks and, 65

definition, 254

disassociate frames, 61

firewalls and, 64

MAC addresses, 61, 63

race conditions and, 61

routers and, 64

sniffers and, 60

spy-blocking software, 153

spycleaners, 119

spyware

description, 118

drive-by downloads, 152

exposure, 151–152

keyloggers, 119

system monitors, 119

SSDP Discovery Service, 215

SSID (service set identifier)

access point location and, 190

broadcast disable, 204–205

case sensitivity, 190

configuration errors and, 133

creation tips, 190

default, wardriving protection and, 93, 188–190

definition, 254

hardware identification and, 190

network protection and, 91

passwords and, 190

personal information in, 190

usernames and, 190

standards

802.11, 249

802.11a, 244, 249

802.11b, 243, 249

802.11c, 244

802.11d, 244

802.11e, 245

802.11f, 245

802.11g, 244, 249

802.11h, 245

802.11i, 245, 249

802.11IR, 246

802.11n, 246

802.11x, 249

802.15.1, 247

802.15.3, 248

802.15.4, 247

802.16a, 246

Bluetooth, 247

HiperLAN, 248

introduction, 15

outdated, 14–15

WiMAX, 246

WiMedia, 248

ZigBee, 247

star network topology, 5

static electricity, hardware and, 231

static IP addresses, security and, 195

steganography, 171

storage, backups, 220–223

strong signal jamming DoS attack, 73–74

subdomains, 40

subnets

addresses, 36–37

masking, 38

surge protection, 228–229

switches, access points and, 11

symmetric key cryptography, failings, 173–174

system monitors, 119




Caution. Wireless Networking. Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net