Networked computing
applications are
increasingly challenged
by security concerns
-- concerns that
secrets may be
lost to competitors,
concerns that
hackers may intrude
into our business
networks, concerns
that someone may
compromise critical
resources.
These issues
are especially
critical where
wireless technology
comprises part
of the network
infrastructure.
A whole new class
of threat is introduced
with deliberately
radiated signals
that others may
receive, and open,
wireless receivers
that may be deceived
into accepting
undesired input
signals.
Securing
Your Wireless
Networks
presents a thorough
assessment of
the security threats
and challenges
that confront
the IT professional
and manager in
modern wireless
computing environments.
This short course
is designed to
improve the effectiveness
of IT professionals,
managers and security
officers by exposing
them to an extensive
review of networked
computing security
risks and treatment
of solution alternatives.
Anyone with a
professional interest
in knowing more
about the risks
to their wireless
computing environments
and the security
solutions which
are available
will benefit from
attending.
There are no
technical prerequisites
for this program,
other than an
assumed understanding
of networked computing
principles. Securing
Your Wireless
Networks has been
designed as a
freestanding treatment
of the subject
designed to complement
the accompanying
Mobile Computing
and wireless LANs
course. Students
will benefit from
attending this
earlier course,
but it is not
a prerequisite.
This course is
taught using several
classroom demonstration
labs, and whenever
feasible, includes
students experimenting
with WLAN configurations
and operation.
A permanent,
comprehensive
workbook is included
for each attendee
-- which provides
a work-along class
reference manual
with a cross-referenced,
comprehensive
subject index,
encyclopedic glossary
and recommended
reading catalog.
(i) Introduction
The Wireless Environment
is Different
Security Issues
in Distributed
Systems
Elements of Risk
in Client/Server
Systems
Unique Challenges
With Web-based
Computing Services
Points of Security
Exposure
(ii) Security
Issues With TCP/IP-Based
Computing
Summary Features
of TCP and IP
World Wide Web
Features and Security
Traditions of
Trust in TCP/IP
Networks
Roles of Clients
and Servers and
Open Systems Issues
An Increasingly
Sophisticated
Threat Community
Challenges From
Viruses and Other
Mal-ware
(iii) Introduction
to Cryptography
We Start With
a Secure Physical
Environment
National Policy
Issues
Traditional Symmetric
Key Cryptography
The DES and IDEA
Algorithms
Public Key Cryptography;
RSA and Other
Examples
(iv) Authentication
Limitations of
User ID's and
Passwords
Authentication
Services
Kerberos
The Public Key
Infrastructure
and Digital Certificates
RADIUS, TACACS
and Diameter Authentication
Services
(v) Wireless Systems
Security Initiatives
Early Misadventures
With Cellular/Mobile
Security
The Temptation
to Use Stream
Ciphers
Elements of Wired
Equivalent Privacy
Parallel Problems
With GSM and Bluetooth
(vi) Initiatives
to Fix Wired Equivalent
Privacy
Increasing the
Key Size to 64
and 128 bits
Non-standard Dynamic
Key Changing Solutions
Temporal Key Integrity
Protocol
The WPA/IEEE 802.11i
Supplemental Standard
The Robust Security
Network (RSN)
With AES
(vii) Firewalls
Firewalls Design
Objectives
Survey of Firewall
Types
Network Address
Translation
DMZ Configurations
Firewall Arrangements
For Wireless Are
Different
Limitations with
Firewall-Connected
Environments
(viii) Creating
A Wireless Security
Solution
Essential Elements
of a Secure Environment
Promoting User
Awareness
The Devil is in
The Details
Configuring the
WLAN Behind a
Firewall
Implementing Authentication
and Encryption
Demonstration:
WLAN Security-Related
Configuration
Issues
Appendices
Glossary
of Terminology
Suggestions For
Further Reading
General
Index
Click
here to return
to our catalog
page
|