There have already been several attacks on wireless devices including Phage, 911, Vapor and Palm.Liberty.A - the first known Trojan horse designed to erase the memory of Palm devices. As usage increases, and applications for wireless devices become more robust, the potential for malicious code attack is high. This book guides readers through current wireless technologies and standards, security risks, available security measures, and vunerabilities that have yet to be addressed. It emphasizes how to identify the vulnerabilities and mitigate them by building security into the network infrastructure and connected devices.
Table of Contents
Preface. Introduction. Part I: Technology Essentials. Chapter 1: Computing Technology. Chapter 2: Wireless Theory. Chapter 3: Wireless Reality. Part II: Security Essentials. Chapter 4: Security Concepts and Methodologies. Chapter 5: Security Technologies. Chapter 6: Threats and Solutions. Appendix A: Glossary. Appendix B: A WLAN Exploitation Guide. Appendix C: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. Appendix D: NASA White Paper on the Wireless Firewall Gateway. Appendix E: Referenced Documents and URLs. Index.
RUSSELL DEAN VINES is founder and President of The RDV Group Inc., a New York City-based security consulting services firm. His company is active in detecting, preventing, and solving security vulnerabilities for clients in government, finance, and new media organizations. Vines is also a frequent speaker on security issues and coauthor of the bestselling book The CISSP Prep Guide: Mastering the Ten Domains of Computer Security (Wiley).