Flylib.com
Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Table of Contents
BackCover
Wireless Operational Security
Foreword
Preface
Section I: General Network Security
Chapter 1: Basic Concepts
1.1 Threats to Personal Privacy
1.2 Fraud and Theft
1.3 Internet Fraud
1.4 Employee Sabotage
1.5 Infrastructure Attacks
1.6 Malicious Hackers
1.7 Malicious Coders
1.8 Industrial Espionage
1.9 Social Engineering
1.10 Privacy Standards and Regulations
1.11 Endnotes
Chapter 2: Managing Access
2.2 Password Management
2.3 Endnotes
Chapter 3: Setting up Defenses
3.2 Defense-in-Depth Strategy
3.3 The Common Criteria Model
3.4 Security Architecture
3.5 Operations Security
3.6 Host-Based Intrusion Detection
3.7 Network-Based Intrusion Detection Efforts
3.8 Endnotes
Chapter 4: Incident Management
4.2 Incident Handling Process Overview
4.3 Endnotes
Chapter 5: Securing Web Applications
5.2 Endnotes
Chapter 6: Security and the Law
6.2 President s Executive Order on Critical Infrastructure Protection
6.3 The USA Patriot Act of 2001
6.4 The Homeland Security Act of 2002
6.5 Changes to Existing Laws
6.6 Investigations
6.7 Ethics
6.8 Endnotes
Section II: Wireless Network Security
Chapter 7: Wireless Networking Basics
7.2 Mobile Security
7.3 Encryption Schemes in WLANs
7.4 Endnotes
Chapter 8: WLAN Policy and Risk Management
8.1 Purpose and Goals of WLAN Security Policies
8.2 Basic Approach to WLAN Security and Policy Development
8.3 WLAN Risk Management
8.4 Risks to Wired Networks From Wireless Networks
8.5 Security Issues for Wireless Public-Access Network Use
8.6 Sample WLAN Security Checklist
8.7 Creating WLANs in Public Space
8.8 Designs for Scalable and Secure WLAN Solutions
8.9 Endnotes
Chapter 9: WLAN Intrusion Process
9.2 Social Engineering
9.3 Searching Publicly Available Resources
9.4 War-Driving, -Walking, -Flying, and -Chalking
9.5 Exploitable WLAN Configurations
9.6 How Intruders Obtain Network Access to a WLAN
9.7 Password Gathering and Cracking Software
9.8 Share Enumerators
9.9 Using Antennas and WLAN Equipment
9.10 Denial-of-Service Attacks and Tools
9.11 Rogue Devices as Exploitation Tools
9.12 Other Useful Tools and Techniques
9.13 Use of Malicious Code or File Insertion in WLANs
9.14 Security Vulnerabilities with Public-Access Wireless Networks
9.15 Weaknesses in Existing Security Solutions
9.16 Endnotes
Chapter 10: WLAN Risk and Threat Mitigation
10.2 Using Dynamic WEP (802.1x and EAP) to Address Authentication and Encryption Flaws in 802.11
10.3 VPNs in a WLAN Environment
10.4 Enhancing WLAN Security
10.5 Other WLAN Security Issues
10.6 Conclusion
10.7 Endnotes
Chapter 11: Additional WLAN Security Solutions
11.2 Security Advantages of Thin Clients in a Wireless Environment
11.3 Using DHCP Services for Authentication
11.4 Baselining
11.5 Using Kerberos, RADIUS, and LDAP for WLAN Authentication
11.6 Multifactor Authentication
11.7 802.11i and WiFi Protected Access
11.8 Conclusion
11.9 Endnotes
Chapter 12: WISDOM for WLAN Practitioners
12.2 Costs of Securing WLANs
12.3 WLAN Threat and Impact Analysis
12.4 WLAN Security Management Considerations
12.5 Applying WISDOM to WLAN Security
12.6 Conclusion
12.7 Endnotes
Glossary
B-C
D
E-G
H-I
K-M
N-P
Q-S
T
U-W
Appendix A: Wireless Policy Essentials
A.2 ABC Inc. InfoSec Risk Assessment Policy
A.3 ABC Inc. InfoSec Audit Policy
A.4 ABC Inc. InfoSec Acceptable Use Policy
A.5 ABC Inc. InfoSec Network Policy
A.6 ABC Inc. InfoSec De-Militarized Zone (DMZ) Policy
A.7 ABC Inc. InfoSec Router Policy
A.8 ABC Inc. InfoSec Extranet Policy
A.9 ABC Inc. InfoSec Remote Access Policy
A.10 ABC Inc. InfoSec Dial-In Access Policy
A.11 ABC Inc. InfoSec VPN Communication Policy
A.12 ABC Inc. InfoSec Wireless Communication Policy
A.13 ABC Inc. InfoSec Server Policy
A.14 ABC Inc. InfoSec Password Policy
A.15 ABC Inc. InfoSec Application Password Policy
A.16 ABC Inc. InfoSec Anti-Virus Policy
A.17 ABC Inc. InfoSec Policy Exception Form
Appendix B: Wireless-Related Legislative Links
Appendix C: Additional WLAN References
C.2 Security Risks and Legal Protections Recap
C.3 Endnotes
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
The Guiding Principles of Agile Project Management
Management Style
Principles to Practices
Practice: Participatory Decision Making
Explore Summary
Beginning Cryptography with Java
Asymmetric Key Cryptography
Object Description in Cryptography Using ASN.1
Key and Certificate Management Using Keystores
CMS and S/MIME
Appendix C Using the Bouncy Castle API for Elliptic Curve
Inside Network Security Assessment: Guarding Your IT Infrastructure
Process for Assessing Risk
Performing the Assessment
A Brief History of Security Tools
Ranking Your Findings
Roles, Responsibilities, and Accountabilities
Strategies for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
The Evolution of IT Governance at NB Power
Cisco CallManager Fundamentals (2nd Edition)
Circuit-Switched Systems
The Three Responsibilities of Call Routing
Overview of Station Device Features Supported by CallManager
H.323 Gateways
Application Protocols
Quantitative Methods in Project Management
Introduction to Probability and Statistics for Projects
Risk-Adjusted Financial Management
Expense Accounting and Earned Value
Quantitative Time Management
Quantitative Methods in Project Contracts
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies