Flylib.com
Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Table of Contents
BackCover
Wireless Operational Security
Foreword
Preface
Section I: General Network Security
Chapter 1: Basic Concepts
1.1 Threats to Personal Privacy
1.2 Fraud and Theft
1.3 Internet Fraud
1.4 Employee Sabotage
1.5 Infrastructure Attacks
1.6 Malicious Hackers
1.7 Malicious Coders
1.8 Industrial Espionage
1.9 Social Engineering
1.10 Privacy Standards and Regulations
1.11 Endnotes
Chapter 2: Managing Access
2.2 Password Management
2.3 Endnotes
Chapter 3: Setting up Defenses
3.2 Defense-in-Depth Strategy
3.3 The Common Criteria Model
3.4 Security Architecture
3.5 Operations Security
3.6 Host-Based Intrusion Detection
3.7 Network-Based Intrusion Detection Efforts
3.8 Endnotes
Chapter 4: Incident Management
4.2 Incident Handling Process Overview
4.3 Endnotes
Chapter 5: Securing Web Applications
5.2 Endnotes
Chapter 6: Security and the Law
6.2 President s Executive Order on Critical Infrastructure Protection
6.3 The USA Patriot Act of 2001
6.4 The Homeland Security Act of 2002
6.5 Changes to Existing Laws
6.6 Investigations
6.7 Ethics
6.8 Endnotes
Section II: Wireless Network Security
Chapter 7: Wireless Networking Basics
7.2 Mobile Security
7.3 Encryption Schemes in WLANs
7.4 Endnotes
Chapter 8: WLAN Policy and Risk Management
8.1 Purpose and Goals of WLAN Security Policies
8.2 Basic Approach to WLAN Security and Policy Development
8.3 WLAN Risk Management
8.4 Risks to Wired Networks From Wireless Networks
8.5 Security Issues for Wireless Public-Access Network Use
8.6 Sample WLAN Security Checklist
8.7 Creating WLANs in Public Space
8.8 Designs for Scalable and Secure WLAN Solutions
8.9 Endnotes
Chapter 9: WLAN Intrusion Process
9.2 Social Engineering
9.3 Searching Publicly Available Resources
9.4 War-Driving, -Walking, -Flying, and -Chalking
9.5 Exploitable WLAN Configurations
9.6 How Intruders Obtain Network Access to a WLAN
9.7 Password Gathering and Cracking Software
9.8 Share Enumerators
9.9 Using Antennas and WLAN Equipment
9.10 Denial-of-Service Attacks and Tools
9.11 Rogue Devices as Exploitation Tools
9.12 Other Useful Tools and Techniques
9.13 Use of Malicious Code or File Insertion in WLANs
9.14 Security Vulnerabilities with Public-Access Wireless Networks
9.15 Weaknesses in Existing Security Solutions
9.16 Endnotes
Chapter 10: WLAN Risk and Threat Mitigation
10.2 Using Dynamic WEP (802.1x and EAP) to Address Authentication and Encryption Flaws in 802.11
10.3 VPNs in a WLAN Environment
10.4 Enhancing WLAN Security
10.5 Other WLAN Security Issues
10.6 Conclusion
10.7 Endnotes
Chapter 11: Additional WLAN Security Solutions
11.2 Security Advantages of Thin Clients in a Wireless Environment
11.3 Using DHCP Services for Authentication
11.4 Baselining
11.5 Using Kerberos, RADIUS, and LDAP for WLAN Authentication
11.6 Multifactor Authentication
11.7 802.11i and WiFi Protected Access
11.8 Conclusion
11.9 Endnotes
Chapter 12: WISDOM for WLAN Practitioners
12.2 Costs of Securing WLANs
12.3 WLAN Threat and Impact Analysis
12.4 WLAN Security Management Considerations
12.5 Applying WISDOM to WLAN Security
12.6 Conclusion
12.7 Endnotes
Glossary
B-C
D
E-G
H-I
K-M
N-P
Q-S
T
U-W
Appendix A: Wireless Policy Essentials
A.2 ABC Inc. InfoSec Risk Assessment Policy
A.3 ABC Inc. InfoSec Audit Policy
A.4 ABC Inc. InfoSec Acceptable Use Policy
A.5 ABC Inc. InfoSec Network Policy
A.6 ABC Inc. InfoSec De-Militarized Zone (DMZ) Policy
A.7 ABC Inc. InfoSec Router Policy
A.8 ABC Inc. InfoSec Extranet Policy
A.9 ABC Inc. InfoSec Remote Access Policy
A.10 ABC Inc. InfoSec Dial-In Access Policy
A.11 ABC Inc. InfoSec VPN Communication Policy
A.12 ABC Inc. InfoSec Wireless Communication Policy
A.13 ABC Inc. InfoSec Server Policy
A.14 ABC Inc. InfoSec Password Policy
A.15 ABC Inc. InfoSec Application Password Policy
A.16 ABC Inc. InfoSec Anti-Virus Policy
A.17 ABC Inc. InfoSec Policy Exception Form
Appendix B: Wireless-Related Legislative Links
Appendix C: Additional WLAN References
C.2 Security Risks and Legal Protections Recap
C.3 Endnotes
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Trees
Other Important SWT Components
SWT Graphics and Image Handling
Drawing Diagrams with Draw2D
Sample Application
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Cisco IPC Express System Components
Summary
Cisco IP Phone Options
The Cisco 7914 Expansion Module
Troubleshooting H.323 GK Integration
FileMaker Pro 8: The Missing Manual
Printing and Preview Mode
Creating Layouts for Reports
Number Crunching Calculations
Commenting Scripts
Appendix B. FileMaker Error Codes
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Point-to-Point Protocol (PPP)
Internet Protocol (IP) Basics
Internet Protocol Version 6 (IPv6)
User Datagram Protocol
Internet Protocol Security (IPSec)
Visual C# 2005 How to Program (2nd Edition)
Introduction
Summary
(Optional) Software Engineering Case Study: Incorporating Inheritance and Polymorphism into the ATM System
TabControl Control
Non-Generic Collections
Ruby Cookbook (Cookbooks (OReilly))
Matching Strings with Regular Expressions
Looping Through Multiple Iterables in Parallel
Passing Data from the Controller to the View
Extracting Code into Helper Functions
Using Java Libraries with JRuby
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies