Chapter 1. Wireless Technologies

Chapter 1. Wireless Technologies

A journey of a thousand miles begins with one step.

Chinese proverb

Writing a chapter on wireless security is as easy as writing one on computers, the Internet, first aid, or applying to college. Each could be the subject of a dissertation, a semester-long course, or an entire book. To study a technology without learning its security risks and adaptations is to be remiss. The first component of our investigation is wireless architectures. We describe a typical system and examine its parts: devices, technologies, and network arrangements. We then lay out case studies of conceptual wireless systems so that we can discuss in real terms, throughout the book, security issues and best practices for building a secure system. Our secondary goal is to present information about wireless systems and about security principles. Our primary goal is to teach the process of securing a system from the ground up.

You should be able to read this text and come away with

         The experience of walking, step by step, through a top-to-bottom security risk assessment and mitigation plan

         Knowledge of wireless issues that are important to understand to protect wireless systems

 



Wireless Security and Privacy(c) Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques
ISBN: 0201760347
EAN: 2147483647
Year: 2002
Pages: 73

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net