Flylib.com
Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Table of Contents
BackCover
Wireless Operational Security
Foreword
Preface
Section I: General Network Security
Chapter 1: Basic Concepts
1.1 Threats to Personal Privacy
1.2 Fraud and Theft
1.3 Internet Fraud
1.4 Employee Sabotage
1.5 Infrastructure Attacks
1.6 Malicious Hackers
1.7 Malicious Coders
1.8 Industrial Espionage
1.9 Social Engineering
1.10 Privacy Standards and Regulations
1.11 Endnotes
Chapter 2: Managing Access
2.2 Password Management
2.3 Endnotes
Chapter 3: Setting up Defenses
3.2 Defense-in-Depth Strategy
3.3 The Common Criteria Model
3.4 Security Architecture
3.5 Operations Security
3.6 Host-Based Intrusion Detection
3.7 Network-Based Intrusion Detection Efforts
3.8 Endnotes
Chapter 4: Incident Management
4.2 Incident Handling Process Overview
4.3 Endnotes
Chapter 5: Securing Web Applications
5.2 Endnotes
Chapter 6: Security and the Law
6.2 President s Executive Order on Critical Infrastructure Protection
6.3 The USA Patriot Act of 2001
6.4 The Homeland Security Act of 2002
6.5 Changes to Existing Laws
6.6 Investigations
6.7 Ethics
6.8 Endnotes
Section II: Wireless Network Security
Chapter 7: Wireless Networking Basics
7.2 Mobile Security
7.3 Encryption Schemes in WLANs
7.4 Endnotes
Chapter 8: WLAN Policy and Risk Management
8.1 Purpose and Goals of WLAN Security Policies
8.2 Basic Approach to WLAN Security and Policy Development
8.3 WLAN Risk Management
8.4 Risks to Wired Networks From Wireless Networks
8.5 Security Issues for Wireless Public-Access Network Use
8.6 Sample WLAN Security Checklist
8.7 Creating WLANs in Public Space
8.8 Designs for Scalable and Secure WLAN Solutions
8.9 Endnotes
Chapter 9: WLAN Intrusion Process
9.2 Social Engineering
9.3 Searching Publicly Available Resources
9.4 War-Driving, -Walking, -Flying, and -Chalking
9.5 Exploitable WLAN Configurations
9.6 How Intruders Obtain Network Access to a WLAN
9.7 Password Gathering and Cracking Software
9.8 Share Enumerators
9.9 Using Antennas and WLAN Equipment
9.10 Denial-of-Service Attacks and Tools
9.11 Rogue Devices as Exploitation Tools
9.12 Other Useful Tools and Techniques
9.13 Use of Malicious Code or File Insertion in WLANs
9.14 Security Vulnerabilities with Public-Access Wireless Networks
9.15 Weaknesses in Existing Security Solutions
9.16 Endnotes
Chapter 10: WLAN Risk and Threat Mitigation
10.2 Using Dynamic WEP (802.1x and EAP) to Address Authentication and Encryption Flaws in 802.11
10.3 VPNs in a WLAN Environment
10.4 Enhancing WLAN Security
10.5 Other WLAN Security Issues
10.6 Conclusion
10.7 Endnotes
Chapter 11: Additional WLAN Security Solutions
11.2 Security Advantages of Thin Clients in a Wireless Environment
11.3 Using DHCP Services for Authentication
11.4 Baselining
11.5 Using Kerberos, RADIUS, and LDAP for WLAN Authentication
11.6 Multifactor Authentication
11.7 802.11i and WiFi Protected Access
11.8 Conclusion
11.9 Endnotes
Chapter 12: WISDOM for WLAN Practitioners
12.2 Costs of Securing WLANs
12.3 WLAN Threat and Impact Analysis
12.4 WLAN Security Management Considerations
12.5 Applying WISDOM to WLAN Security
12.6 Conclusion
12.7 Endnotes
Glossary
B-C
D
E-G
H-I
K-M
N-P
Q-S
T
U-W
Appendix A: Wireless Policy Essentials
A.2 ABC Inc. InfoSec Risk Assessment Policy
A.3 ABC Inc. InfoSec Audit Policy
A.4 ABC Inc. InfoSec Acceptable Use Policy
A.5 ABC Inc. InfoSec Network Policy
A.6 ABC Inc. InfoSec De-Militarized Zone (DMZ) Policy
A.7 ABC Inc. InfoSec Router Policy
A.8 ABC Inc. InfoSec Extranet Policy
A.9 ABC Inc. InfoSec Remote Access Policy
A.10 ABC Inc. InfoSec Dial-In Access Policy
A.11 ABC Inc. InfoSec VPN Communication Policy
A.12 ABC Inc. InfoSec Wireless Communication Policy
A.13 ABC Inc. InfoSec Server Policy
A.14 ABC Inc. InfoSec Password Policy
A.15 ABC Inc. InfoSec Application Password Policy
A.16 ABC Inc. InfoSec Anti-Virus Policy
A.17 ABC Inc. InfoSec Policy Exception Form
Appendix B: Wireless-Related Legislative Links
Appendix C: Additional WLAN References
C.2 Security Risks and Legal Protections Recap
C.3 Endnotes
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
The Business of APM
Phase: Envision
Project Size
Practice: Customer Team-Developer Team Interface
Implementing the Vision
High-Speed Signal Propagation[c] Advanced Black Magic
Necessary Mathematics: Input Impedance and Transfer Function
Differential to Common-Mode Conversion
SNR Budgeting
UTP Transmission Example: 10BASE-T
Simple Cases Involving Transmission Lines
VBScript Programmers Reference
Data Types
Control of Flow
Remote Scripting
Adding VBScript to Your VB Applications
Appendix A VBScript Functions and Keywords
Network Security Architectures
Network Security Technologies
Edge Security Design
Software-Based Teleworker Design
Applied Knowledge Questions
Black Helicopter Research Limited
The Complete Cisco VPN Configuration Guide
IPsec Connections
Overview of the 3002 Hardware Client
PIX and ASA Site-to-Site Connections
ISAKMP/IKE Phase 1 Management Connection
ISAKMP/IKE Phase 2 Connections
Java All-In-One Desk Reference For Dummies
Java Programming Basics
Working with Variables and Data Types
Adding Some Methods to Your Madness
Working with Statics
Book IX - Fun and Games
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies