Guide to Wireless Network Security

Front Cover
Springer Science & Business Media, Oct 16, 2006 - Computers - 848 pages
1. INTRODUCTION With the increasing deployment of wireless networks (802. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. An important aspect of this is the need to provide secure access to the network for valid users. Existing wired network jacks are located inside buildings already secured from unauthorized access through the use of keys, badge access, and so forth. A user must gain physical access to the building in order to plug a client computer into a network jack. In contrast, a wireless access point (AP) may be accessed from off the premises if the signal is detectable (for instance, from a parking lot adjacent to the building). Thus, wireless networks require secure access to the AP and the ability to isolate the AP from the internal private network prior to user authentication into the network domain. Furthermore, as enterprises strive to provide better availability of mission-critical wireless data, they also face the challenge of maintaining that data's security and integrity. While each connection with a client, a supplier or a enterprise partner can improve responsiveness and efficiency, it also increases the vulnerability of enterprise wireless data to attack. In such an environment, wireless network security is becoming more important every day. Also, with the growing reliance on e-commerce, wireless network-based services and the Internet, enterprises are faced with an ever-increasing responsibility to protect their systems from attack.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Types of Wireless Network Security Technology
57
Standards 85
84
Enhanced Security For Wireless Lans And Wans In The Enterprise
115
Handling Wireless Private Information
151
Wireless Network Security Design Issues
163
Standards Design Issues
187
Implementation Plan Development
215
Wireless Network Security Planning Techniques
253
Standards Development
353
Ensuring Site Security
359
INFORMATION WARFARE COUNTERMEASURES
368
The Information Warfare Wireless Network Security Arsenal
409
The Information Warfare Wireless Network Security Arsenal
458
The Information Warfare Wireless Network Security Arsenal
519
The Information Warfare Wireless Network Security Arsenal
557
Wireless Network Security Surveillance Tools For Information
600

Testing Techniques
263
Internetworking Wireless Security 271
270
Installation And Deployment
285
Securing Your Wireless ECommerce Storefront 295
294
Certification Of Wireless Network Security Performance
321
Configuring Secure Access 329
328
Management Of Wireless Network Security
335
Ongoing Maintenance
345
The Victims And Refugees Of Information
639
Providing Wireless Network Security Solutions For ISP Intranet
682
Enhancing Wireless Web Server Security
735
Summary Conclusions and Recommendations
763
Ensuring BuiltIn Frequency Hopping Spread Spectrum Wireless
781
List Of Top Wireless Network Security Implementation
801
Copyright

Other editions - View all

Common terms and phrases