A journey of a thousand miles begins with one step.
Chinese proverb
Writing a chapter on wireless security is as easy as writing one on computers, the Internet, first aid, or applying to college. Each could be the subject of a dissertation, a semester-long course, or an entire book. To study a technology without learning its security risks and adaptations is to be remiss. The first component of our investigation is wireless architectures. We describe a typical system and examine its parts: devices, technologies, and network arrangements. We then lay out case studies of conceptual wireless systems so that we can discuss in real terms, throughout the book, security issues and best practices for building a secure system. Our secondary goal is to present information about wireless systems and about security principles. Our primary goal is to teach the process of securing a system from the ground up.
You should be able to read this text and come away with
The experience of walking, step by step, through a top-to-bottom security risk assessment and mitigation plan
Knowledge of wireless issues that are important to understand to protect wireless systems