Wireless Operational Security
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap.
*Presents a new "WISDOM" model for Wireless Security Infrastructures
*Acts as a critical guide to implementing "Converged Networks" wired/wireless with all necessary security considerations
*Rittinghouse's Cybersecurity Operations Handbook is the only security book recommended by the FCC
6 pages matching Secure Shell in this book
Results 1-3 of 6
What people are saying - Write a review
We haven't found any reviews in the usual places.
Setting Up Defenses
12 other sections not shown
ABC Inc ABC Inc.'s Access Control access point administrators algorithm allow application attack audit authentication server communications configuration connection corporate cryptographic database decrypt default detection devices DHCP digital certificate e-mail EAP-TLS employees encryption enforcement ensure environment firewall function gateway hacker hardware hash host implementation incident information system InfoSec infrastructure integrity interface Internet intrusion IP address IPSec Kerberos L2TP L2TP/IPSec Layer LDAP MAC address mobile monitoring organization packet password PPTP protect protocol public key RADIUS server Retrieved August 23 risk rogue router Secure Shell security policy security solution session SNMP specific spoofing SSID standard system security TCP Wrappers tion TKIP traffic tunnel types unauthorized access USA Patriot Act user authentication vendors WEP key wired network wireless client wireless network WLAN WLAN security
Advances in Enterprise Information Technology Security
Limited preview - 2007