home | briefing notes | business contacts | contact us
 
 
home : catalog : network security : securing your wireless networks
 
 
 

Securing Your Wireless Networks

Focus
Networked computing applications are increasingly challenged by security concerns -- concerns that secrets may be lost to competitors, concerns that hackers may intrude into our business networks, concerns that someone may compromise critical resources.

These issues are especially critical where wireless technology comprises part of the network infrastructure. A whole new class of threat is introduced with deliberately radiated signals that others may receive, and open, wireless receivers that may be deceived into accepting undesired input signals.

Securing Your Wireless Networks presents a thorough assessment of the security threats and challenges that confront the IT professional and manager in modern wireless computing environments.

Who Should Attend
This short course is designed to improve the effectiveness of IT professionals, managers and security officers by exposing them to an extensive review of networked computing security risks and treatment of solution alternatives.

Anyone with a professional interest in knowing more about the risks to their wireless computing environments and the security solutions which are available will benefit from attending.

Prerequisites and Format

There are no technical prerequisites for this program, other than an assumed understanding of networked computing principles. Securing Your Wireless Networks has been designed as a freestanding treatment of the subject designed to complement the accompanying Mobile Computing and wireless LANs course. Students will benefit from attending this earlier course, but it is not a prerequisite.

This course is taught using several classroom demonstration labs, and whenever feasible, includes students experimenting with WLAN configurations and operation.

A permanent, comprehensive workbook is included for each attendee -- which provides a work-along class reference manual with a cross-referenced, comprehensive subject index, encyclopedic glossary and recommended reading catalog.

Program Outline: Securing Your Wireless Networks

(i) Introduction
The Wireless Environment is Different
Security Issues in Distributed Systems
Elements of Risk in Client/Server Systems
Unique Challenges With Web-based Computing Services
Points of Security Exposure

(ii) Security Issues With TCP/IP-Based Computing
Summary Features of TCP and IP
World Wide Web Features and Security
Traditions of Trust in TCP/IP Networks
Roles of Clients and Servers and Open Systems Issues
An Increasingly Sophisticated Threat Community
Challenges From Viruses and Other Mal-ware

(iii) Introduction to Cryptography

We Start With a Secure Physical Environment
National Policy Issues
Traditional Symmetric Key Cryptography
The DES and IDEA Algorithms
Public Key Cryptography; RSA and Other Examples

(iv) Authentication

Limitations of User ID's and Passwords
Authentication Services
Kerberos
The Public Key Infrastructure and Digital Certificates
RADIUS, TACACS and Diameter Authentication Services

(v) Wireless Systems Security Initiatives

Early Misadventures With Cellular/Mobile Security
The Temptation to Use Stream Ciphers
Elements of Wired Equivalent Privacy
Parallel Problems With GSM and Bluetooth

(vi) Initiatives to Fix Wired Equivalent Privacy

Increasing the Key Size to 64 and 128 bits
Non-standard Dynamic Key Changing Solutions
Temporal Key Integrity Protocol
The WPA/IEEE 802.11i Supplemental Standard
The Robust Security Network (RSN) With AES

(vii) Firewalls

Firewalls Design Objectives
Survey of Firewall Types
Network Address Translation
DMZ Configurations
Firewall Arrangements For Wireless Are Different
Limitations with Firewall-Connected Environments

(viii) Creating A Wireless Security Solution

Essential Elements of a Secure Environment
Promoting User Awareness
The Devil is in The Details
Configuring the WLAN Behind a Firewall
Implementing Authentication and Encryption
Demonstration: WLAN Security-Related Configuration Issues

Appendices

Glossary of Terminology
Suggestions For Further Reading

General Index

 

Click here to return to our catalog page