Catálogo de publicaciones - libros

Compartir en
redes sociales


Guide to Wireless Network Security

John R. Vacca

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-0-387-95425-7

ISBN electrónico

978-0-387-29845-0

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer Science+Business Media, LLC 2006

Tabla de contenidos

Ensuring Site Integrity

John R. Vacca

Secure wireless networks can be deployed quickly and cost effectively once the architecture and hardware are procured. However, complexity increases as the amount of serviceable users and coverage area grows. When users must “roam” between different access points, new criteria enter into the equation, due to the complexities involved in configuring a wireless network that provides users the mobility they desire. Finally, when these factors are taken into consideration, a wireless network can be designed with appropriate countermeasures, to provide both mobility and security for wireless networks in hostile environments.

Part V - Maintaining Wireless Network Security | Pp. 359-367

Defensive Wireless Network Security Strategies for Governments and Industry Groups

John R. Vacca

Enterprises and users benefit when access to public wireless web servers is safe and convenient and when the enterprise’s electronic information resources are secure, reliable, and available. As is the case with all other aspects of remote access to enterprise resources, the use of public wireless web servers entails risks as well as benefits. Finally, these risks and benefits must be managed through careful planning, and through the implementation of guidelines, for the secure operation of public wireless web servers.

Part VI - Information Warfare Countermeasures: The Wireless Network Security Solution | Pp. 371-407

The Information Warfare Wireless Network Security Arsenal and Tactics of the Military

John R. Vacca

Like most advances, wireless LANs and WWANs pose both opportunities and risks. The technology can represent a powerful complement to an enterprise’s networking capabilities, enabling increased employee productivity and reducing IT costs. To minimize the attendant risks, IT administrators can implement a range of measures, including establishment of wireless security policies and practices, as well as implementation of various LAN and WAN design and implementation measures. Finally, achieving this balance of opportunity and risk allows enterprises to confidently implement wireless LANs and realize the benefits this increasingly viable technology offers.

Part VI - Information Warfare Countermeasures: The Wireless Network Security Solution | Pp. 409-457

The Information Warfare Wireless Network Security Arsenal and Tactics of Terrorists and Rogues

John R. Vacca

This chapter began with some fundamental concepts of wireless network security. The chapter outlined the main security risks for an enterprise to deploy intranets and extranets. The chapter further described some security vulnerabilities in the TCP/IP protocol suite that gives attackers many opportunities for malicious attacks on Internet connected computers. Finally, the chapter also presented the methods and techniques that attackers use to circumvent wireless network security.

Part VI - Information Warfare Countermeasures: The Wireless Network Security Solution | Pp. 459-517

The Information Warfare Wireless Network Security Arsenal and Tactics of Private Enterprises

John R. Vacca

This chapter began with some fundamental concepts of wireless network security. The chapter outlined the main security risks for an enterprise to deploy intranets and extranets. The chapter further described some security vulnerabilities in the TCP/IP protocol suite that gives attackers many opportunities for malicious attacks on Internet connected computers. Finally, the chapter also presented the methods and techniques that attackers use to circumvent wireless network security.

Part VI - Information Warfare Countermeasures: The Wireless Network Security Solution | Pp. 519-556

The Information Warfare Wireless Network Security Arsenal of the Future

John R. Vacca

In this chapter, you’ve discovered how to find wireless networks, gain access to them even if they’re using WEP encryption, find vulnerable systems and ports, and use various utilities to assist you in those endeavors. This is mostly what a hacker would do to gain access to your systems. Finally, by knowing your hacker, you can then successfully implement strategies to circumvent these methods.

Part VI - Information Warfare Countermeasures: The Wireless Network Security Solution | Pp. 557-599

Wireless Network Security Surveillance Tools for Information Warfare of the Future

John R. Vacca

By now, the rationale behind incorporating a strong wireless network security solution into your enterprise insurance plan is clear. In today’s digital marketplace, with new and more volatile wireless network threats emerging every week, it’s protection rather than reaction that will preserve your bottom line. If strong protection is the answer, the question must then be: what kind?

Part VI - Information Warfare Countermeasures: The Wireless Network Security Solution | Pp. 601-637

Civilian Casualties: The Victims and Refugees of Information Warfare Wireless Network Security

John R. Vacca

Wireless software applications can realize a level of security that satisfies the needs of most enterprises, assuming you plan effective solutions and have security policies in place that enforce conformance to security mechanisms. Keep in mind, however, that the strongest authentication and data encryption won’t keep a hacker from merely looking over the shoulder of someone using a wireless device in a public place. So don’t forget to educate users on this simple hacker tactic as well as the more sophisticated ones.

Part VI - Information Warfare Countermeasures: The Wireless Network Security Solution | Pp. 639-680

Providing Wireless Network Security Solutions for ISP Intranet, Internet and E-Commerce

John R. Vacca

This chapter began with some fundamental concepts of wireless network security. The chapter outlined the main security risks for an enterprise to deploy intranets and extranets. The chapter further described some security vulnerabilities in the TCP/IP protocol suite that gives attackers many opportunities for malicious attacks on Internet connected computers. Finally, the chapter also presented the methods and techniques that attackers use to circumvent wireless network security.

Part VII - Wireless Network Security Solutions and Future Directions | Pp. 683-733

Enhancing Wireless Web Server Security

John R. Vacca

Enterprises and users benefit when access to public wireless web servers is safe and convenient and when the enterprise’s electronic information resources are secure, reliable, and available. As is the case with all other aspects of remote access to enterprise resources, the use of public wireless web servers entails risks as well as benefits. Finally, these risks and benefits must be managed through careful planning, and through the implementation of guidelines, for the secure operation of public wireless web servers.

Part VII - Wireless Network Security Solutions and Future Directions | Pp. 735-743