Wireless Operational SecurityThis comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap. *Presents a new "WISDOM" model for Wireless Security Infrastructures *Acts as a critical guide to implementing "Converged Networks" wired/wireless with all necessary security considerations *Rittinghouse's Cybersecurity Operations Handbook is the only security book recommended by the FCC |
Contents
Section IGeneral Network Security | 1 |
Managing Access | 23 |
2 | 38 |
Copyright | |
18 other sections not shown
Other editions - View all
Wireless Operational Security John Rittinghouse, PhD, CISM,James F. Ransome, PhD, CISM, CISSP Limited preview - 2004 |
Common terms and phrases
ABC Inc Access Control access point administrators algorithm allow application attack audit authentication server Bluetooth communications configuration connection corporate cryptographic database decryption default deployed detection devices DHCP digital signature e-mail EAP-TLS employees encryption enforcement ensure environment firewall function gateway hacker hardware hash IEEE implementation incident information system InfoSec infrastructure integrity interface Internet intrusion IP address IPSec Kerberos L2TP L2TP/IPSec Layer LDAP MAC address mobile monitoring organization packet password PEAP PPTP procedures protect protocol public key RADIUS server remote risk rogue router security policy security solution signature SNMP specific SSID standard system security TCP Wrappers threats tion TKIP traffic tunnel types unauthorized access USA Patriot Act user's vendors vulnerabilities WEP key wired network wireless client wireless network WLAN WLAN security
References to this book
Advances in Enterprise Information Technology Security Khadraoui, Djamel,Herrmann, Francine No preview available - 2007 |