
Wireless Security and Privacy : Best Practices and Design Techniques
by Swaminatha, Tara M.; Elden, Charles R.-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Rent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
Foreword | p. xiii |
Preface | p. xvii |
About the Authors | p. xxv |
Acknowledgments | p. xxvii |
Establish a Foundation | |
Wireless Technologies | p. 3 |
An Introduction to Wireless Architecture | p. 3 |
Usage Models | p. 4 |
Internet Bridge | p. 5 |
Conference | p. 5 |
Multipurpose Phone | p. 5 |
Synchronizer | p. 6 |
Devices | p. 6 |
Cell Phones and Personal Digital Assistants (PDAs) | p. 6 |
Wireless Laptops | p. 7 |
Consumer Issues | p. 8 |
Technical Issues | p. 10 |
Network Arrangements and Technologies | p. 11 |
802.11b | p. 12 |
The Wireless Application Protocol (WAP) | p. 13 |
Wireless Wide Area Networks | p. 14 |
Local Area Networks | p. 14 |
Personal Area Networks and Bluetooth | p. 15 |
Wireless LAN Appeal | p. 16 |
Case Studies | p. 17 |
The Hospital | p. 17 |
The Office Complex | p. 18 |
The University Campus | p. 19 |
The Home | p. 19 |
Security Principles | p. 21 |
Security Principles | p. 22 |
Authentication | p. 22 |
Access Control and Authorization | p. 23 |
Nonrepudiation | p. 23 |
Privacy and Confidentiality | p. 24 |
Integrity | p. 25 |
Auditing | p. 25 |
Development and Operation Principles | p. 26 |
Functionality | p. 27 |
Utility | p. 27 |
Usability | p. 27 |
Efficiency | p. 28 |
Maintainability | p. 28 |
Scalability | p. 28 |
Testability | p. 28 |
Management Principles | p. 29 |
Schedule | p. 29 |
Cost | p. 29 |
Marketability | p. 30 |
Margin | p. 30 |
The Security Analysis Process--I-ADD | p. 30 |
Identify | p. 31 |
Analyze | p. 32 |
Define | p. 32 |
Design | p. 32 |
Repeat | p. 33 |
The Foundation | p. 34 |
Know Your System | |
Technologies | p. 39 |
802.11 and 802.11b | p. 39 |
802.11 System Components | p. 40 |
802.11 Architecture Modes | p. 41 |
802.11b Physical Layer | p. 43 |
802.11 Media Access Control Layer | p. 44 |
802.11b Security and Wired Equivalent Privacy (WEP) | p. 45 |
Bluetooth | p. 48 |
Bluetooth Physical Layer | p. 49 |
Bluetooth Protocol Architecture | p. 52 |
Bluetooth Profiles | p. 53 |
Bluetooth Security | p. 54 |
WAP | p. 55 |
WAP Overview | p. 57 |
Wireless Application Environment (WAE) | p. 58 |
WAP Security | p. 61 |
Devices | p. 63 |
Personal Digital Assistants | p. 64 |
Palm OS Devices | p. 66 |
Palm Security | p. 67 |
Palm OS 4.0 | p. 68 |
Pocket PC Devices | p. 68 |
BlackBerry (RIM 950 and 957) | p. 70 |
BlackBerry APIs | p. 71 |
BlackBerry Security | p. 72 |
Languages | p. 75 |
Wireless Application Protocol (WAP) | p. 76 |
WAP Browsers | p. 77 |
Wireless Markup Language (WML) | p. 79 |
WMLScript | p. 83 |
J2ME | p. 86 |
The Future of J2ME | p. 96 |
Protect Your System | |
Cryptography | p. 99 |
Applied Cryptography Overview | p. 100 |
The Office Complex Case Study | p. 100 |
Primitives and Protocols | p. 103 |
Symmetric and Asymmetric Algorithms | p. 103 |
Cryptographic Attacks | p. 105 |
Symmetric Cryptography | p. 107 |
Symmetric Primitives | p. 107 |
Symmetric Protocols | p. 112 |
Asymmetric Cryptography | p. 116 |
Asymmetric Primitives | p. 116 |
Asymmetric Protocols | p. 119 |
Common Problems | p. 122 |
Cryptography by Itself | p. 123 |
Proprietary Cryptographic Protocols | p. 123 |
Common Misuses | p. 124 |
Choices | p. 127 |
Performance | p. 128 |
Effectiveness | p. 128 |
Decision Trade-Offs | p. 130 |
Key Points | p. 130 |
COTS | p. 133 |
COTS versus Custom Software | p. 133 |
Custom Software | p. 134 |
Virtual Private Network (VPN) | p. 135 |
Hardware-Based VPNs | p. 138 |
Firewall-Based VPNs | p. 139 |
Software-Based VPNs | p. 140 |
Tunneling | p. 141 |
The Seven-Layer OSI Model | p. 141 |
PPTP | p. 143 |
L2TP | p. 144 |
IPSec | p. 144 |
SmartCards | p. 145 |
Biometric Authentication | p. 146 |
Privacy | p. 149 |
The Online Privacy Debate in the Wired World | p. 149 |
Privacy in the Wireless World | p. 152 |
The Players | p. 153 |
Related Privacy Legislation and Policy | p. 153 |
The Communications Assistance for Law Enforcement Act (CALEA) | p. 154 |
E-911 | p. 154 |
The Wireless Communications and Public Safety Act of 1999 | p. 156 |
The U.S.A. Patriot Act of 2001 | p. 157 |
Location-Based Marketing and Services and GPS | p. 158 |
The Middle Ground Answer | p. 160 |
Progress in the Wired World | p. 161 |
I-ADD | |
Identify Targets and Roles | p. 165 |
Identify Targets | p. 165 |
The Wireless Device | p. 165 |
The Service Provider | p. 171 |
Identify Roles | p. 175 |
Malicious Users | p. 175 |
Mapping Roles to Targets | p. 177 |
Analyze Attacks and Vulnerabilities | p. 187 |
Known Attacks | p. 187 |
Device Theft | p. 188 |
The Man in the Middle | p. 188 |
War Driving | p. 188 |
Denial of Service | p. 188 |
The DoCoMo E-Mail Virus | p. 189 |
Vulnerabilities and Theoretical Attacks | p. 189 |
Vulnerabilities of the Wireless Device | p. 190 |
Vulnerabilities of the Service Provider | p. 195 |
Vulnerabilities of the Gateway | p. 199 |
Vulnerabilities of the Web Server and the Backend Server | p. 203 |
Analyze Mitigations and Protections | p. 205 |
Protecting the Wireless Device | p. 206 |
Limiting the Vulnerability to Loss | p. 206 |
Limiting the Vulnerability to Theft | p. 207 |
Protecting the Physical Interface | p. 207 |
Protecting Access to the User Interface | p. 207 |
Protecting Personal Data on the PDA | p. 208 |
Protecting Corporate or Third-Party Information | p. 211 |
Protecting Access to Network and Online Services | p. 215 |
Protecting the Transceiver | p. 217 |
Protecting Vulnerabilities of the Service Provider | p. 217 |
Protecting the Transceiver Services | p. 218 |
Protecting Access to Its Subscribers | p. 219 |
Protecting the Transceiver | p. 222 |
Protecting the Administrative Server | p. 222 |
Protecting User-Specific Data | p. 222 |
Protecting the Network Server | p. 227 |
Protecting Corporate Proprietary Data and Resources | p. 228 |
Protecting Vulnerabilities of the Gateway | p. 229 |
Prioritizing | p. 229 |
Building Trust--Application Security | p. 231 |
Define and Design | p. 233 |
The Case Studies Revisited | p. 235 |
The Hospital | p. 235 |
The Office Complex | p. 239 |
The University Campus | p. 241 |
The Home | p. 243 |
Case Studies Conclusion | p. 244 |
Just the Beginning | p. 245 |
Afterword: The Future of Wireless Security | p. 247 |
Bibliography | p. 249 |
Index | p. 257 |
Table of Contents provided by Syndetics. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.