| Foreword |
|
xvii | |
|
|
|
1 | (74) |
|
|
|
2 | (1) |
|
Wireless Technology Overview |
|
|
2 | (5) |
|
Defining Cellular-based Wireless |
|
|
3 | (1) |
|
Defining the Wireless LAN |
|
|
3 | (1) |
|
The Convergence of Wireless Technologies |
|
|
3 | (1) |
|
|
|
4 | (1) |
|
Increasing Use of Information Appliances |
|
|
5 | (1) |
|
The Future of Wireless, circa 2005 |
|
|
6 | (1) |
|
Understanding the Promise of Wireless |
|
|
7 | (9) |
|
|
|
9 | (1) |
|
Wireless Networking Applications for Business |
|
|
9 | (5) |
|
Wireless Networking Applications for Consumers |
|
|
14 | (2) |
|
Understanding the Benefits of Wireless |
|
|
16 | (8) |
|
|
|
16 | (1) |
|
|
|
16 | (2) |
|
|
|
18 | (3) |
|
|
|
21 | (1) |
|
|
|
22 | (1) |
|
|
|
22 | (2) |
|
|
|
24 | (1) |
|
|
|
24 | (1) |
|
Facing the Reality of Wireless Today |
|
|
24 | (14) |
|
|
|
25 | (2) |
|
|
|
27 | (1) |
|
Market Adoption Challenges |
|
|
27 | (1) |
|
The Limitations of ``Radio'' |
|
|
27 | (3) |
|
|
|
30 | (1) |
|
|
|
30 | (1) |
|
Interference and Coexistence |
|
|
31 | (1) |
|
The Limitations of Wireless Security |
|
|
32 | (2) |
|
Cellular-based Wireless Networks and WAP |
|
|
34 | (1) |
|
Wireless LAN Networks and WEP |
|
|
35 | (3) |
|
Examining the Wireless Standards |
|
|
38 | (30) |
|
Cellular-based Wireless Networks |
|
|
38 | (1) |
|
Communications Technologies |
|
|
39 | (7) |
|
|
|
46 | (1) |
|
|
|
47 | (7) |
|
|
|
54 | (3) |
|
|
|
57 | (3) |
|
|
|
60 | (2) |
|
Understanding Public Key Infrastructures and Wireless Networking |
|
|
62 | (1) |
|
|
|
63 | (5) |
|
|
|
68 | (1) |
|
|
|
69 | (4) |
|
Frequently Asked Questions |
|
|
73 | (2) |
|
|
|
75 | (50) |
|
|
|
76 | (1) |
|
Understanding Security Fundamentals and Principles of Protection |
|
|
76 | (17) |
|
|
|
77 | (1) |
|
|
|
78 | (2) |
|
|
|
80 | (1) |
|
|
|
81 | (1) |
|
|
|
81 | (4) |
|
|
|
85 | (2) |
|
|
|
87 | (3) |
|
Accounting and Audit Trails |
|
|
90 | (2) |
|
|
|
92 | (1) |
|
|
|
92 | (1) |
|
|
|
93 | (1) |
|
Reviewing the Role of Policy |
|
|
93 | (8) |
|
|
|
96 | (1) |
|
Understanding Classification Criteria |
|
|
97 | (1) |
|
|
|
98 | (3) |
|
Recognizing Accepted Security and Privacy Standards |
|
|
101 | (12) |
|
Reviewing Security Standards |
|
|
101 | (1) |
|
|
|
102 | (2) |
|
Understanding the Common Criteria Model |
|
|
104 | (1) |
|
|
|
104 | (1) |
|
|
|
104 | (1) |
|
|
|
104 | (1) |
|
|
|
105 | (1) |
|
Reviewing Privacy Standards and Regulations |
|
|
106 | (1) |
|
|
|
106 | (1) |
|
|
|
106 | (2) |
|
|
|
108 | (3) |
|
Electronic Signatures in the Global and National Commerce Act |
|
|
111 | (1) |
|
|
|
112 | (1) |
|
|
|
112 | (1) |
|
Addressing Common Risks and Threats |
|
|
113 | (6) |
|
Experiencing Loss of Data |
|
|
113 | (1) |
|
|
|
113 | (1) |
|
Experiencing Denial and Disruption of Service |
|
|
114 | (1) |
|
Disruption of Service Scenario |
|
|
114 | (1) |
|
|
|
115 | (2) |
|
|
|
117 | (1) |
|
Preempting the Consequences of an Organization's Loss |
|
|
117 | (1) |
|
|
|
118 | (1) |
|
|
|
119 | (1) |
|
|
|
120 | (3) |
|
Frequently Asked Questions |
|
|
123 | (2) |
|
Wireless Network Architecture and Design |
|
|
125 | (76) |
|
|
|
126 | (1) |
|
Fixed Wireless Technologies |
|
|
127 | (14) |
|
Multichannel Multipoint Distribution Service |
|
|
127 | (2) |
|
Local Multipoint Distribution Services |
|
|
129 | (1) |
|
|
|
129 | (1) |
|
|
|
130 | (2) |
|
Wireless Local Area Networks |
|
|
132 | (1) |
|
Why the Need for a Wireless LAN Standard? |
|
|
132 | (2) |
|
What Exactly Does the 802.11 Standard Define? |
|
|
134 | (3) |
|
Does the 802.11 Standard Guarantee Compatibility across Different Vendors? |
|
|
137 | (1) |
|
|
|
138 | (1) |
|
|
|
139 | (1) |
|
|
|
140 | (1) |
|
Developing WLANs through the 802.11 Architecture |
|
|
141 | (9) |
|
|
|
141 | (2) |
|
|
|
143 | (1) |
|
Services to the 802.11 Architecture |
|
|
143 | (2) |
|
|
|
145 | (1) |
|
|
|
146 | (1) |
|
|
|
146 | (1) |
|
Configuring Fragmentation |
|
|
147 | (1) |
|
Using Power Management Options |
|
|
147 | (1) |
|
|
|
147 | (1) |
|
|
|
148 | (2) |
|
Developing WPANs through the 802.15 Architecture |
|
|
150 | (4) |
|
|
|
150 | (3) |
|
|
|
153 | (1) |
|
High Performance Radio LAN |
|
|
153 | (1) |
|
Mobile Wireless Technologies |
|
|
154 | (6) |
|
First Generation Technologies |
|
|
155 | (1) |
|
Second Generation Technologies |
|
|
156 | (1) |
|
|
|
156 | (1) |
|
Third Generation Technologies |
|
|
156 | (1) |
|
Wireless Application Protocol |
|
|
157 | (1) |
|
Global System for Mobile Communications |
|
|
158 | (2) |
|
General Packet Radio Service |
|
|
160 | (1) |
|
|
|
160 | (1) |
|
Optical Wireless Technologies |
|
|
160 | (1) |
|
Exploring the Design Process |
|
|
161 | (5) |
|
Conducting the Preliminary Investigation |
|
|
162 | (1) |
|
Performing Analysis of the Existing Environment |
|
|
162 | (1) |
|
Creating a Preliminary Design |
|
|
163 | (1) |
|
Finalizing the Detailed Design |
|
|
164 | (1) |
|
Executing the Implementation |
|
|
164 | (1) |
|
Capturing the Documentation |
|
|
165 | (1) |
|
Creating the Design Methodology |
|
|
166 | (17) |
|
Creating the Network Plan |
|
|
166 | (1) |
|
Gathering the Requirements |
|
|
167 | (1) |
|
Baselining the Existing Network |
|
|
168 | (1) |
|
Analyzing the Competitive Practices |
|
|
169 | (1) |
|
Beginning the Operations Planning |
|
|
169 | (1) |
|
Performing a Gap Analysis |
|
|
169 | (1) |
|
Creating a Technology Plan |
|
|
170 | (1) |
|
Creating an Integration Plan |
|
|
171 | (1) |
|
Beginning the Collocation Planning |
|
|
171 | (1) |
|
Performing a Risk Analysis |
|
|
171 | (1) |
|
|
|
172 | (1) |
|
Preparing the Planning Deliverables |
|
|
172 | (1) |
|
Developing the Network Architecture |
|
|
173 | (1) |
|
Reviewing and Validating the Planning Phase |
|
|
173 | (1) |
|
Creating a High-Level Topology |
|
|
173 | (1) |
|
Creating a Collocation Architecture |
|
|
174 | (1) |
|
Defining the High-Level Services |
|
|
174 | (1) |
|
Creating a High-Level Physical Design |
|
|
175 | (1) |
|
Defining the Operations Services |
|
|
175 | (1) |
|
Creating a High-Level Operating Model |
|
|
175 | (1) |
|
|
|
176 | (1) |
|
|
|
177 | (1) |
|
Creating the Network Architecture Deliverable |
|
|
177 | (1) |
|
Formalizing the Detailed Design Phase |
|
|
177 | (1) |
|
Reviewing and Validating the Network Architecture |
|
|
178 | (1) |
|
Creating the Detailed Topology |
|
|
178 | (1) |
|
Creating a Detailed Service Collocation Design |
|
|
179 | (1) |
|
Creating the Detailed Services |
|
|
179 | (1) |
|
Creating a Detailed Physical Design |
|
|
180 | (1) |
|
Creating a Detailed Operations Design |
|
|
181 | (1) |
|
Creating a Detailed Operating Model Design |
|
|
181 | (1) |
|
|
|
182 | (1) |
|
Developing a Maintenance Plan |
|
|
182 | (1) |
|
Developing an Implementation Plan |
|
|
182 | (1) |
|
Creating the Detailed Design Documents |
|
|
183 | (1) |
|
Understanding Wireless Network Attributes from a Design Perspective |
|
|
183 | (8) |
|
|
|
184 | (2) |
|
|
|
186 | (1) |
|
|
|
187 | (2) |
|
|
|
189 | (2) |
|
|
|
191 | (2) |
|
|
|
193 | (5) |
|
Frequently Asked Questions |
|
|
198 | (3) |
|
Common Attacks and Vulnerabilities |
|
|
201 | (38) |
|
|
|
202 | (1) |
|
|
|
202 | (11) |
|
Criticisms of the Overall Design |
|
|
203 | (2) |
|
Weaknesses in the Encryption Algorithm |
|
|
205 | (3) |
|
Weaknesses in Key Management |
|
|
208 | (3) |
|
Weaknesses in User Behavior |
|
|
211 | (2) |
|
Conducting Reconnaissance |
|
|
213 | (3) |
|
|
|
213 | (1) |
|
Finding Weaknesses in a Target |
|
|
214 | (1) |
|
Exploiting Those Weaknesses |
|
|
215 | (1) |
|
Sniffing, Interception, and Eavesdropping |
|
|
216 | (4) |
|
|
|
216 | (1) |
|
|
|
217 | (1) |
|
|
|
217 | (2) |
|
Protecting Against Sniffing and Eavesdropping |
|
|
219 | (1) |
|
Spoofing and Unauthorized Access |
|
|
220 | (3) |
|
|
|
220 | (1) |
|
|
|
221 | (1) |
|
|
|
221 | (2) |
|
Protecting Against Spoofing and Unauthorized Attacks |
|
|
223 | (1) |
|
Network Hijacking and Modification |
|
|
223 | (3) |
|
|
|
223 | (1) |
|
|
|
224 | (1) |
|
|
|
225 | (1) |
|
Protection against Network Hijacking and Modification |
|
|
225 | (1) |
|
Denial of Service and Flooding Attacks |
|
|
226 | (2) |
|
Defining DoS and Flooding |
|
|
226 | (1) |
|
|
|
227 | (1) |
|
DoS and Flooding Case Scenario |
|
|
227 | (1) |
|
Protecting Against DoS and Flooding Attacks |
|
|
228 | (1) |
|
The Introduction of Malware |
|
|
228 | (2) |
|
|
|
230 | (2) |
|
|
|
232 | (1) |
|
|
|
232 | (5) |
|
Frequently Asked Questions |
|
|
237 | (2) |
|
Wireless Security Countermeasures |
|
|
239 | (60) |
|
|
|
240 | (1) |
|
|
|
241 | (4) |
|
Addressing the Issues with Policy |
|
|
243 | (2) |
|
|
|
245 | (8) |
|
Threat Equals Risk Plus Vulnerability |
|
|
246 | (7) |
|
Designing and Deploying a Secure Network |
|
|
253 | (4) |
|
|
|
257 | (7) |
|
|
|
257 | (1) |
|
Creating Privacy with WEP |
|
|
258 | (1) |
|
The WEP Authentication Process |
|
|
259 | (1) |
|
WEP Benefits and Advantages |
|
|
259 | (1) |
|
|
|
260 | (1) |
|
The Security Implications of Using WEP |
|
|
260 | (1) |
|
Implementing WEP on the Aironet |
|
|
261 | (1) |
|
Implementing WEP on the ORiNOCO AP-1000 |
|
|
262 | (1) |
|
Securing a WLAN with WEP: A Case Scenario |
|
|
262 | (2) |
|
|
|
264 | (7) |
|
|
|
265 | (1) |
|
MAC Benefits and Advantages |
|
|
266 | (1) |
|
|
|
266 | (1) |
|
Security Implications of MAC Filtering |
|
|
267 | (1) |
|
Implementing MAC Filters on the AP-1000 |
|
|
267 | (2) |
|
Implementing MAC Filters on the Aironet 340 |
|
|
269 | (1) |
|
Filtering MAC Addresses: A Case Scenario |
|
|
270 | (1) |
|
|
|
271 | (2) |
|
Defining Protocol Filters |
|
|
271 | (1) |
|
Protocol Filter Benefits and Advantages |
|
|
272 | (1) |
|
Protocol Filter Disadvantages |
|
|
272 | (1) |
|
Security Implications of Using Protocol Filters |
|
|
272 | (1) |
|
Using Closed Systems and Networks |
|
|
273 | (5) |
|
|
|
273 | (1) |
|
Closed System Benefits and Advantages |
|
|
274 | (1) |
|
Closed System Disadvantages |
|
|
275 | (1) |
|
Security Implications of Using a Closed System |
|
|
275 | (1) |
|
A Closed Environment on a Cisco Aironet Series AP |
|
|
275 | (1) |
|
A Closed Environment on an ORiNOCO AP-1000 |
|
|
275 | (2) |
|
Implementing a Closed System: A Case Scenario |
|
|
277 | (1) |
|
Enabling WEP on the ORiNOCO Client |
|
|
277 | (1) |
|
|
|
278 | (3) |
|
Defining IP Allocation on the WLAN |
|
|
278 | (1) |
|
Deploying IP over the WLAN: Benefits and Advantages |
|
|
279 | (1) |
|
Deploying IP over the WLAN: Disadvantages |
|
|
279 | (1) |
|
Security Implications of Deploying IP over the WLAN |
|
|
280 | (1) |
|
Deploying IP over the WLAN: A Case Scenario |
|
|
280 | (1) |
|
|
|
281 | (6) |
|
VPN Benefits and Advantages |
|
|
283 | (1) |
|
|
|
284 | (1) |
|
Security Implications of Using a VPN |
|
|
284 | (1) |
|
Layering Your Protection Using a VPN |
|
|
285 | (1) |
|
Utilizing a VPN: A Case Scenario |
|
|
286 | (1) |
|
|
|
287 | (5) |
|
End User Security Benefits and Advantages |
|
|
290 | (1) |
|
End User Security Disadvantages |
|
|
290 | (1) |
|
User Security: A Case Scenario |
|
|
291 | (1) |
|
|
|
292 | (1) |
|
|
|
293 | (3) |
|
Frequently Asked Questions |
|
|
296 | (3) |
|
Circumventing Security Measures |
|
|
299 | (28) |
|
|
|
300 | (1) |
|
Planning and Preparations |
|
|
300 | (3) |
|
|
|
301 | (1) |
|
Choosing the Tools and Equipment Required for Attack |
|
|
301 | (1) |
|
|
|
302 | (1) |
|
Detecting a Closed System |
|
|
303 | (1) |
|
|
|
303 | (3) |
|
Security of 64-bit versus 128-bit Keys |
|
|
304 | (1) |
|
|
|
305 | (1) |
|
|
|
306 | (4) |
|
What Threat Do These ``Open Networks'' Pose to Network Security? |
|
|
307 | (1) |
|
What Tools Are Necessary to Perform a War Drive? |
|
|
307 | (1) |
|
What Network Information Can I Discover from a War Drive? |
|
|
308 | (2) |
|
Can War Driving Be Detected? |
|
|
310 | (1) |
|
|
|
310 | (2) |
|
What Are the Benefits of Device Theft? |
|
|
311 | (1) |
|
|
|
312 | (3) |
|
|
|
312 | (1) |
|
Where in the Authentication/Association Process Does MAC Filtering Occur? |
|
|
313 | (1) |
|
Determining MAC Filtering Is Enabled |
|
|
314 | (1) |
|
|
|
314 | (1) |
|
Bypassing Advanced Security Mechanisms |
|
|
315 | (3) |
|
|
|
316 | (1) |
|
|
|
316 | (1) |
|
|
|
317 | (1) |
|
|
|
317 | (1) |
|
|
|
318 | (2) |
|
|
|
318 | (1) |
|
Social Engineering Targets |
|
|
319 | (1) |
|
Installing Rogue Access Points |
|
|
320 | (2) |
|
Where Is the Best Location for a Rogue AP? |
|
|
320 | (1) |
|
|
|
321 | (1) |
|
Risks Created by a Rogue AP |
|
|
321 | (1) |
|
Are Rogue APs Detectable? |
|
|
321 | (1) |
|
|
|
322 | (1) |
|
|
|
323 | (1) |
|
|
|
323 | (3) |
|
Frequently Asked Questions |
|
|
326 | (1) |
|
Monitoring and Intrusion Detection |
|
|
327 | (36) |
|
|
|
328 | (1) |
|
|
|
328 | (3) |
|
Starting with a Closed Network |
|
|
329 | (1) |
|
Ruling Out Environmental Obstacles |
|
|
330 | (1) |
|
|
|
331 | (1) |
|
Defensive Monitoring Considerations |
|
|
331 | (6) |
|
Availability and Connectivity |
|
|
332 | (1) |
|
|
|
332 | (1) |
|
|
|
333 | (1) |
|
Detecting a Denial of Service |
|
|
334 | (1) |
|
Monitoring for Performance |
|
|
335 | (1) |
|
|
|
335 | (1) |
|
Monitoring Tools of the Trade |
|
|
336 | (1) |
|
Intrusion Detection Strategies |
|
|
337 | (9) |
|
Integrated Security Monitoring |
|
|
338 | (1) |
|
Watching for Unauthorized Traffic and Protocols |
|
|
339 | (2) |
|
Unauthorized MAC Addresses |
|
|
341 | (1) |
|
Popular Monitoring Products |
|
|
342 | (1) |
|
|
|
343 | (3) |
|
Conducting Vulnerability Assessments |
|
|
346 | (2) |
|
Incident Response and Handling |
|
|
348 | (5) |
|
|
|
350 | (1) |
|
|
|
350 | (1) |
|
|
|
351 | (1) |
|
|
|
352 | (1) |
|
|
|
352 | (1) |
|
Conducting Site Surveys for Rogue Access Points |
|
|
353 | (5) |
|
|
|
353 | (1) |
|
The Well-intentioned Employee |
|
|
353 | (1) |
|
|
|
354 | (1) |
|
Tracking Rogue Access Points |
|
|
355 | (3) |
|
|
|
358 | (1) |
|
|
|
359 | (2) |
|
Frequently Asked Questions |
|
|
361 | (2) |
|
|
|
363 | (44) |
|
|
|
364 | (1) |
|
Designing and Planning a Successful Audit |
|
|
364 | (13) |
|
|
|
365 | (1) |
|
|
|
365 | (2) |
|
Measuring System Operation |
|
|
367 | (1) |
|
Measuring System Compliance |
|
|
368 | (1) |
|
|
|
368 | (1) |
|
|
|
368 | (1) |
|
|
|
369 | (1) |
|
|
|
370 | (1) |
|
|
|
370 | (1) |
|
|
|
370 | (1) |
|
Unplanned Emergency Audits |
|
|
371 | (1) |
|
|
|
371 | (1) |
|
|
|
372 | (1) |
|
Audit Information Gathering |
|
|
372 | (1) |
|
Audit Information Analysis and Report Generation |
|
|
372 | (1) |
|
Audit Report Presentation |
|
|
373 | (1) |
|
|
|
373 | (1) |
|
|
|
373 | (1) |
|
|
|
374 | (1) |
|
|
|
374 | (1) |
|
|
|
375 | (1) |
|
Critical Auditing Success Factors |
|
|
376 | (1) |
|
|
|
377 | (9) |
|
|
|
378 | (1) |
|
|
|
378 | (1) |
|
|
|
378 | (1) |
|
|
|
378 | (1) |
|
|
|
379 | (1) |
|
Auditing, Security Standards, and Best Practices |
|
|
379 | (3) |
|
Corporate Security Policies |
|
|
382 | (2) |
|
Auditing Charters and Irregularities |
|
|
384 | (1) |
|
|
|
384 | (1) |
|
|
|
384 | (1) |
|
|
|
385 | (1) |
|
Establishing the Audit Scope |
|
|
385 | (1) |
|
Establishing the Documentation Process |
|
|
386 | (1) |
|
|
|
386 | (4) |
|
Auditors and Technologists |
|
|
386 | (1) |
|
Obtaining Support from IS/IT Departments |
|
|
387 | (1) |
|
Senior Management Support |
|
|
387 | (1) |
|
|
|
388 | (1) |
|
|
|
388 | (1) |
|
|
|
389 | (1) |
|
|
|
389 | (1) |
|
|
|
390 | (1) |
|
|
|
390 | (2) |
|
|
|
391 | (1) |
|
|
|
392 | (1) |
|
|
|
392 | (10) |
|
The Importance of Audit Report Quality |
|
|
393 | (1) |
|
|
|
393 | (1) |
|
|
|
394 | (1) |
|
Prioritized Recommendations |
|
|
394 | (1) |
|
|
|
394 | (1) |
|
|
|
395 | (1) |
|
|
|
396 | (1) |
|
|
|
396 | (1) |
|
|
|
396 | (1) |
|
Final Thoughts on Auditing |
|
|
396 | (1) |
|
|
|
397 | (1) |
|
Sample Management Report: Wireless Network Security Audit Report XYZ Corporation |
|
|
397 | (1) |
|
Sample Technical Report Wireless Network Security Audit Report: XYZ Corporation |
|
|
398 | (4) |
|
|
|
402 | (1) |
|
|
|
403 | (3) |
|
Frequently Asked Questions |
|
|
406 | (1) |
|
|
|
407 | (32) |
|
|
|
408 | (1) |
|
Implementing a Non-secure Wireless Network |
|
|
409 | (1) |
|
Implementing an Ultra-secure Wireless LAN |
|
|
410 | (8) |
|
Physical Location and Access |
|
|
411 | (1) |
|
|
|
412 | (1) |
|
|
|
413 | (4) |
|
|
|
417 | (1) |
|
|
|
418 | (8) |
|
|
|
426 | (3) |
|
Installing in Difficult Situations |
|
|
427 | (2) |
|
Developing a Wireless Security Checklist |
|
|
429 | (4) |
|
|
|
429 | (1) |
|
|
|
430 | (1) |
|
|
|
431 | (2) |
|
|
|
433 | (1) |
|
|
|
434 | (2) |
|
Frequently Asked Questions |
|
|
436 | (3) |
| Appendix: Hack Proofing Your Wireless Network Fast Track |
|
439 | (28) |
| Index |
|
467 | |