Flylib.com
Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Table of Contents
BackCover
Wireless Operational Security
Foreword
Preface
Section I: General Network Security
Chapter 1: Basic Concepts
1.1 Threats to Personal Privacy
1.2 Fraud and Theft
1.3 Internet Fraud
1.4 Employee Sabotage
1.5 Infrastructure Attacks
1.6 Malicious Hackers
1.7 Malicious Coders
1.8 Industrial Espionage
1.9 Social Engineering
1.10 Privacy Standards and Regulations
1.11 Endnotes
Chapter 2: Managing Access
2.2 Password Management
2.3 Endnotes
Chapter 3: Setting up Defenses
3.2 Defense-in-Depth Strategy
3.3 The Common Criteria Model
3.4 Security Architecture
3.5 Operations Security
3.6 Host-Based Intrusion Detection
3.7 Network-Based Intrusion Detection Efforts
3.8 Endnotes
Chapter 4: Incident Management
4.2 Incident Handling Process Overview
4.3 Endnotes
Chapter 5: Securing Web Applications
5.2 Endnotes
Chapter 6: Security and the Law
6.2 President s Executive Order on Critical Infrastructure Protection
6.3 The USA Patriot Act of 2001
6.4 The Homeland Security Act of 2002
6.5 Changes to Existing Laws
6.6 Investigations
6.7 Ethics
6.8 Endnotes
Section II: Wireless Network Security
Chapter 7: Wireless Networking Basics
7.2 Mobile Security
7.3 Encryption Schemes in WLANs
7.4 Endnotes
Chapter 8: WLAN Policy and Risk Management
8.1 Purpose and Goals of WLAN Security Policies
8.2 Basic Approach to WLAN Security and Policy Development
8.3 WLAN Risk Management
8.4 Risks to Wired Networks From Wireless Networks
8.5 Security Issues for Wireless Public-Access Network Use
8.6 Sample WLAN Security Checklist
8.7 Creating WLANs in Public Space
8.8 Designs for Scalable and Secure WLAN Solutions
8.9 Endnotes
Chapter 9: WLAN Intrusion Process
9.2 Social Engineering
9.3 Searching Publicly Available Resources
9.4 War-Driving, -Walking, -Flying, and -Chalking
9.5 Exploitable WLAN Configurations
9.6 How Intruders Obtain Network Access to a WLAN
9.7 Password Gathering and Cracking Software
9.8 Share Enumerators
9.9 Using Antennas and WLAN Equipment
9.10 Denial-of-Service Attacks and Tools
9.11 Rogue Devices as Exploitation Tools
9.12 Other Useful Tools and Techniques
9.13 Use of Malicious Code or File Insertion in WLANs
9.14 Security Vulnerabilities with Public-Access Wireless Networks
9.15 Weaknesses in Existing Security Solutions
9.16 Endnotes
Chapter 10: WLAN Risk and Threat Mitigation
10.2 Using Dynamic WEP (802.1x and EAP) to Address Authentication and Encryption Flaws in 802.11
10.3 VPNs in a WLAN Environment
10.4 Enhancing WLAN Security
10.5 Other WLAN Security Issues
10.6 Conclusion
10.7 Endnotes
Chapter 11: Additional WLAN Security Solutions
11.2 Security Advantages of Thin Clients in a Wireless Environment
11.3 Using DHCP Services for Authentication
11.4 Baselining
11.5 Using Kerberos, RADIUS, and LDAP for WLAN Authentication
11.6 Multifactor Authentication
11.7 802.11i and WiFi Protected Access
11.8 Conclusion
11.9 Endnotes
Chapter 12: WISDOM for WLAN Practitioners
12.2 Costs of Securing WLANs
12.3 WLAN Threat and Impact Analysis
12.4 WLAN Security Management Considerations
12.5 Applying WISDOM to WLAN Security
12.6 Conclusion
12.7 Endnotes
Glossary
B-C
D
E-G
H-I
K-M
N-P
Q-S
T
U-W
Appendix A: Wireless Policy Essentials
A.2 ABC Inc. InfoSec Risk Assessment Policy
A.3 ABC Inc. InfoSec Audit Policy
A.4 ABC Inc. InfoSec Acceptable Use Policy
A.5 ABC Inc. InfoSec Network Policy
A.6 ABC Inc. InfoSec De-Militarized Zone (DMZ) Policy
A.7 ABC Inc. InfoSec Router Policy
A.8 ABC Inc. InfoSec Extranet Policy
A.9 ABC Inc. InfoSec Remote Access Policy
A.10 ABC Inc. InfoSec Dial-In Access Policy
A.11 ABC Inc. InfoSec VPN Communication Policy
A.12 ABC Inc. InfoSec Wireless Communication Policy
A.13 ABC Inc. InfoSec Server Policy
A.14 ABC Inc. InfoSec Password Policy
A.15 ABC Inc. InfoSec Application Password Policy
A.16 ABC Inc. InfoSec Anti-Virus Policy
A.17 ABC Inc. InfoSec Policy Exception Form
Appendix B: Wireless-Related Legislative Links
Appendix C: Additional WLAN References
C.2 Security Risks and Legal Protections Recap
C.3 Endnotes
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
Measuring ROI in E-Commerce Applications: Analysis to Action
Governing Information Technology Through COBIT
The Evolution of IT Governance at NB Power
Snort Cookbook
Installing Snort on Mac OS X
Positioning Your IDS Sensors
Logging Application Data
Generating Text-Based Log Analysis
Passive OS Fingerprinting
FileMaker Pro 8: The Missing Manual
Managing Data with Data Tunneling
Connecting Databases
Stored, Unstored, and Global Fields
Privilege Sets
Developer Utilities
Java for RPG Programmers, 2nd Edition
The Java Onion
Data Types And Variables
String Manipulation
Exceptions
Appendix B Mixing RPG And Java
Managing Enterprise Systems with the Windows Script Host
Networking Resources
File Operations
Network Administration/WMI
Internet Applications
Internet Information Server
Python Programming for the Absolute Beginner, 3rd Edition
Other System Tools
Text
Handling Multiple Clients
A Simple C Extension Module
The SWIG Integration Code Generator
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies