Building.Secure.Wireless.Networks.with.802.11.eBook-EEn.pdf
(
5936 KB
)
Pobierz
Building Secure Wireless Networks with 802
Building Secure Wireless Networks with 802.11
Table of Contents
Building Secure Wireless Networks with 802.11............................................................................1
Introduction........................................................................................................................................4
Who Should Read This Book...................................................................................................4
What You Need to Know..........................................................................................................5
How This Book Is Organized...................................................................................................5
Part I: Introduction to Wireless Local Area Networks (LANs).......................................................8
Chapter Lis..............................................................................................................................8
Part Overview.....................................................................................................................8
Chapter 1: Networking Basics........................................................................................................10
Highlights...............................................................................................................................10
Development of Computer Networks: An Overview...............................................................10
Network Types.......................................................................................................................13
Peer−to−Peer Networks...................................................................................................13
Local Area Networks (LANs)............................................................................................13
Wide Area Networks (WANs)...........................................................................................14
Personal Area Networks (PANs)......................................................................................15
The Interne......................................................................................................................15
Virtual Private Networks (VPNs)......................................................................................16
Network Topologies...............................................................................................................16
Three Commonly Used Topologies..................................................................................16
Choosing the Right Topology...........................................................................................18
Network Hardware and Software...........................................................................................18
Networking Components..................................................................................................19
Networking Software........................................................................................................26
Networking Protocol: TCP/IP...........................................................................................27
Putting It All Together............................................................................................................29
Summary................................................................................................................................30
Chapter 2: Wireless LANs...............................................................................................................31
Highlights...............................................................................................................................31
Evolution of Wireless LANs: An Overview.............................................................................31
A Basic Wireless LAN............................................................................................................32
Basic Architecture of a Wireless LAN....................................................................................33
Wireless LAN Adapters....................................................................................................33
Access Points (APs.........................................................................................................39
Wireless LAN Configurations.................................................................................................40
Ad−Hoc Mode..................................................................................................................40
Infrastructure Mode..........................................................................................................40
Distribution Service Systems (DSSs)...............................................................................40
Existing Wireless LAN Standards..........................................................................................42
IEEE 802.11.....................................................................................................................42
IEEE 802.11 b..................................................................................................................42
IEEE 802.11 a..................................................................................................................42
HomeRF...........................................................................................................................42
Bluetooth..........................................................................................................................42
Are Wireless LANs Risks to Health?......................................................................................43
Security Risks........................................................................................................................43
i
Table of Contents
Chapter 2: Wireless LANs
Summary................................................................................................................................43
Chapter 3: The Institute of Electrical and Electronics Engineers (IEEE) 802.11 Standards.....44
Overview................................................................................................................................44
History of IEEE.......................................................................................................................44
IEEE 802 Wireless Standards................................................................................................45
The 802.11 Working Group..............................................................................................45
The 802.15 Working Group..............................................................................................45
The 802.16 Working Group..............................................................................................46
The 802.11 Family of Standards............................................................................................46
The 802.11 Standard Details...........................................................................................46
802.11 Security................................................................................................................48
Operating Modes..............................................................................................................49
Roaming...........................................................................................................................50
The 802.11 Extensions..........................................................................................................50
802.11b............................................................................................................................50
802.11 a...........................................................................................................................52
802.11g............................................................................................................................53
802.11 Shortcomings.............................................................................................................54
Wireless Standards Comparison...........................................................................................55
Summary................................................................................................................................55
Chapter 4: Is Wireless LAN Right for You?...................................................................................56
Benefits of Wireless LANs.....................................................................................................56
Deployment Scenarios...........................................................................................................57
Small Office Home Office (SoHo)....................................................................................57
Enterprise.........................................................................................................................58
Wireless Internet Service Providers (WISPs...................................................................59
Costs Associated with Wireless LANs...................................................................................61
SoHo................................................................................................................................61
Enterprise.........................................................................................................................61
WISPs..............................................................................................................................61
Deployment Issues................................................................................................................61
SoHo................................................................................................................................61
Enterprise.........................................................................................................................62
WISPs..............................................................................................................................62
Security..................................................................................................................................62
Health Concerns....................................................................................................................63
Summary................................................................................................................................63
Part II: Secure Wireless LANs........................................................................................................64
Chapter Lis............................................................................................................................64
Part Overview...................................................................................................................64
Chapter 5: Network Security...........................................................................................................65
Overview................................................................................................................................65
Network Operational Security................................................................................................65
Physical Security..............................................................................................................66
Common Network Attacks on Operational Security...............................................................71
ii
Table of Contents
Chapter 5: Network Security
External Network Attacks.................................................................................................71
Internal Network Attacks..................................................................................................76
Network Data Security...........................................................................................................77
Resident−Data or File Security........................................................................................78
Protecting Data Using Cryptographic Primitives..............................................................78
Network Data Transmission and Link Security......................................................................79
Securing Network Transmission......................................................................................80
Summary................................................................................................................................86
Chapter 6: Securing the IEEE 802.11 Wireless LANs...................................................................87
Wireless LAN Security Requirements....................................................................................87
Wireless LAN Operational Security Requirements..........................................................88
Wireless LAN Data Security.............................................................................................90
The Institute of Electrical and Electronics Engineers (IEEE) 802.11 Standard Security........90
Service Set Identifiers (SSID)..........................................................................................91
Wired Equivalent Privacy (WEP) Protocol.......................................................................91
IEEE 802.11 WEP Protocol Weaknesses and Shortcomings................................................95
The Future of 802.11 Standard Security................................................................................96
Common Security Oversights................................................................................................96
Using Default or Out−of−the−Box Security......................................................................96
Using Fixed Shared Keys.................................................................................................97
Using Far−Too−Strong Radio Signals.............................................................................97
Extending Wireless LAN Security..........................................................................................97
The 802.1X Authentication Protoco.................................................................................97
Virtual Private Networks (VPNs)......................................................................................99
Securing Wireless LAN........................................................................................................100
User Authentication........................................................................................................101
Data Confidentiality and Privacy....................................................................................101
Wireless LAN Passwords and Usage Policies...............................................................102
Frequent Network Traffic and Usage Analysis...............................................................102
Summary..............................................................................................................................102
Part III: Building Secure Wireless LANs......................................................................................103
Chapter Lis..........................................................................................................................103
Part Overview.................................................................................................................103
Chapter 7: Planning Wireless LANs.............................................................................................104
Overview..............................................................................................................................104
Step 1: Understanding Your Wireless LAN Needs..............................................................104
Step 2: Planning the Scope of Rollout.................................................................................106
Step 3: Performing Site Survey............................................................................................106
Considering the Geographic Coverage Area.................................................................107
Per−Site Security Requirements....................................................................................107
Profiling Wireless LAN Users and Devices....................................................................107
Step 4: Setting Up Requirements and Expectations............................................................108
Network Bandwidth and Speed......................................................................................108
Coverage Area and Range of Wireless LANs................................................................108
Security..........................................................................................................................109
Step 5: Estimating the Required Wireless LAN Hardware and Software.............................109
iii
Plik z chomika:
X-files
Inne pliki z tego folderu:
Teach Yourself Electricity & Electronics.pdf
(7227 KB)
Wireless Technology Protocols Standards and Techniques.pdf
(5494 KB)
Wireless Mobile Networking with ANSI-41, Second Edition.pdf
(2099 KB)
Wireless Communication Technologies.pdf
(6000 KB)
Wireless Communication Systems - Prentice Hall PTR.chm
(12329 KB)
Inne foldery tego chomika:
130 linux and unix ebooks
132 C and C++ ebooks
156 database ebooks
237.For.Dummies.ebooks.Wiley.Publishing
267 Java ebooks
Zgłoś jeśli
naruszono regulamin