Wireless Security Handbook.pdf
(
17529 KB
)
Pobierz
Wireless Security Handbook
Wireless
Security
Handbook
Aaron E. Earle
Boca Raton New York
© 2006 by Taylor & Francis Group, LLC
Published in 2006 by
Auerbach Publications
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2006 by Taylor & Francis Group, LLC
Auerbach is an imprint of Taylor & Francis Group
No claim to original U.S. Government works
Printed in the United States of America on acid-free paper
10987654321
International Standard Book Number-10: 0-8493-3378-4 (Hardcover)
International Standard Book Number-13: 978-0-8493-3378-1 (Hardcover)
Library of Congress Card Number 2005049924
This book contains information obtained from authentic and highly regarded sources. Reprinted material is
quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts
have been made to publish reliable data and information, but the author and the publisher cannot assume
responsibility for the validity of all materials or for the consequences of their use.
No part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic,
mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and
recording, or in any information storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access
www.copyright.com
(http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC) 222 Rosewood Drive,
Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration
for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate
system of payment has been arranged.
Trademark Notice:
Product or corporate names may be trademarks or registered trademarks, and are used only
for identification and explanation without intent to infringe.
Library of Congress Cataloging-in-Publication Data
Earle, Aaron E.
Wireless security handbook / Aaron E. Earle.
p. cm.
Includes bibliographical references and index.
ISBN 0-8493-3378-4 (alk. paper)
1. Wireless LANs--Security measures. 2. Wireless communication systems--Security measures. I.
Title.
TK5105.78.E23 2005
005.8--dc22
2005049924
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
Taylor & Francis Group
is the Academic Division of Informa plc.
and the Auerbach Publications Web site at
http://www.auerbach-publications.com
© 2006 by Taylor & Francis Group, LLC
OTHER INFORMATION SECURITY BOOKS FROM AUERBACH
Asset Protection and Security Management
Handbook
POA Publishing
ISBN: 0-8493-1603-0
Building a Global Information Assurance
Program
Raymond J. Curts and Douglas E. Campbell
ISBN: 0-8493-1368-6
Building an Information Security Awareness
Program
Mark B. Desman
ISBN: 0-8493-0116-5
Critical Incident Management
Alan B. Sterneckert
ISBN: 0-8493-0010-X
Cyber Crime Investigator’s Field Guide
Bruce Middleton
ISBN: 0-8493-1192-6
Cyber Forensics: A Field Manual for Collecting,
Examining, and Preserving Evidence of
Computer Crimes
Albert J. Marcella, Jr. and Robert S. Greenfield
ISBN: 0-8493-0955-7
The Ethical Hack: A Framework for Business
Value Penetration Testing
James S. Tiller
ISBN: 0-8493-1609-X
The Hacker’s Handbook: The Strategy Behind
Breaking into and Defending Networks
Susan Young and Dave Aitel
ISBN: 0-8493-0888-7
Information Security Architecture:
An Integrated Approach to Security in the
Organization
Jan Killmeyer Tudor
ISBN: 0-8493-9988-2
Information Security Fundamentals
Thomas R. Peltier
ISBN: 0-8493-1957-9
Information Security Management Handbook,
5th Edition
Harold F. Tipton and Micki Krause
ISBN: 0-8493-1997-8
Information Security Policies, Procedures, and
Standards: Guidelines for Effective Information
Security Management
Thomas R. Peltier
ISBN: 0-8493-1137-3
Information Security Risk Analysis, 2nd Edition
Thomas R. Peltier
ISBN: 0-8493-3346-6
Information Technology Control and Audit
Fredrick Gallegos, Daniel Manson,
and Sandra Allen-Senft
ISBN: 0-8493-9994-7
Investigator’s Guide to Steganography
Gregory Kipper
ISBN: 0-8493-2433-5
Managing a Network Vulnerability Assessment
Thomas Peltier, Justin Peltier, and John A. Blackley
ISBN: 0-8493-1270-1
Network Perimeter Security:
Building Defense In-Depth
Cliff Riggs
ISBN: 0-8493-1628-6
The Practical Guide to HIPAA Privacy and
Security Compliance
Kevin Beaver and Rebecca Herold
ISBN: 0-8493-1953-6
A Practical Guide to Security Engineering
and Information Assurance
Debra S. Herrmann
ISBN: 0-8493-1163-2
The Privacy Papers: Managing Technology,
Consumer, Employee and Legislative Actions
Rebecca Herold
ISBN: 0-8493-1248-5
Public Key Infrastructure:
Building Trusted Applications and
Web Services
John R. Vacca
ISBN: 0-8493-0822-4
Securing and Controlling Cisco Routers
Peter T. Davis
ISBN: 0-8493-1290-6
Strategic Information Security
John Wylder
ISBN: 0-8493-2041-0
Surviving Security: How to Integrate
People, Process, and Technology,
Second Edition
Amanda Andress
ISBN: 0-8493-2042-9
A Technical Guide to IPSec Virtual
Private Networks
James S. Tiller
ISBN: 0-8493-0876-3
Using the Common Criteria for IT Security
Evaluation
Debra S. Herrmann
ISBN: 0-8493-1404-6
AUERBACH PUBLICATIONS
www.auerbach-publications.com
To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401
E-mail: orders@crcpress.com
© 2006 by Taylor & Francis Group, LLC
Contents
1
Wireless Network Overview
1.1
Wireless Signal Propagation
1.2.1
Reflection
1.2.2
Refraction
1.2.3
Diffraction
1.2.4
Scattering
1.2.5
Absorption
1.3
Signal-to-Noise Ratio
1.4
Modulation
1.4.1
Amplitude Modulation
1.4.2
Frequency Modulation
1.4.3
Phase Modulation
1.4.4
Complementary Code Keying (CCK)
1.4.5
Quadrature Amplitude Modulation (QAM)
1.5
Wireless Groups
1.5.1
International Telecommunications Union (ITU)
1.5.2
International Telecommunications Union Radio
Sector (ITU-R)
1.5.3
Federal Communications Commission (FCC)
1.5.4
Conference of European Post and Telecommunications
(CEPT)
1.5.5
Wi-Fi Alliance
1.6
Chapter 1 Review Questions
2
Risks and Threats of Wireless
2.1
Goals of Information Security
2.1.1
Confidentiality
2.1.2
Availability
2.1.3
Integrity
2.2
Analysis
2.3
Spoofing
v
© 2006 by Taylor & Francis Group, LLC
1.2
RF Overview
1.5.6
IEEE
vi
Wireless Security Handbook
2.4 Denial-of-Service
2.5 Malicious Code..
2.6 Social Engineering
2.7 Rogue Access Points
2.8 Cell Phone Security
2.9 Wireless Hacking and Hackers
2.9.1 Motives of Wireless Hackers
2.9.2 War Drivers
2.9.3 War Walkers
2.9.4 War Chalking
2.9.5 War Flying
2.9.6 Bluejacking
2.9.7 X10 Driving
2.9.8 Cordless Phone Driving
2.9.9 War Dialing
2.9.10 Tracking War Drivers
2.10 RFID
2.11 Chapter 2 Review Questions
3
The Legality of Computer Crime
3.1
Electronic Communications Privacy Act
3.2
Computer Fraud and Abuse Act
3.2.1
Patriot Act
3.3
State Computer Crime Issues
3.4
Chapter 3 Review Questions
4
Wireless Physical Layer Technologies
4.1
ISM Spectrum
4.2
Frequency Hopping Spread Spectrum (FHSS)
4.3
Direct Sequence Spread Spectrum (DSSS)
4.4
Orthogonal Frequency Division Multiplexing (OFDM)
4.5
Chapter 4 Review Questions
5
Wireless Management Frames
5.1
Beacon
5.2
Probe Request
5.3
Probe Response
5.4
Authentication
5.5
Association Request
5.6
Association Response
5.7
Disassociation and De-Authentication
5.8
CSMA/CA
5.8.1
RTS
5.8.2
CTS
5.8.3
DATA
5.8.4
ACK
© 2006 by Taylor & Francis Group, LLC
Plik z chomika:
apacz456
Inne pliki z tego folderu:
Open Source Security Tools - A Practical Guide to Security Applications.chm
(5754 KB)
Practical Guide for Implementing Secure Intranets & Extranets.chm
(5586 KB)
Professional Rootkits.chm
(8025 KB)
Online Business Security Systems.pdf
(1985 KB)
RSA Security's Official Guide to Cryptography.pdf
(9387 KB)
Inne foldery tego chomika:
Open Source Security
Zgłoś jeśli
naruszono regulamin