Wireless Security and Privacy : Best Practices and Design Techniques

by ;
Format: Paperback
Pub. Date: 2003-01-01
Publisher(s): Addison-Wesley Professional
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $41.99

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Written for wireless development professionals new to security, and for security professionals moving into the wireless arena. Presents the foundation upon which to design and develop secure wireless systems. Softcover.

Table of Contents

Forewordp. xiii
Prefacep. xvii
About the Authorsp. xxv
Acknowledgmentsp. xxvii
Establish a Foundation
Wireless Technologiesp. 3
An Introduction to Wireless Architecturep. 3
Usage Modelsp. 4
Internet Bridgep. 5
Conferencep. 5
Multipurpose Phonep. 5
Synchronizerp. 6
Devicesp. 6
Cell Phones and Personal Digital Assistants (PDAs)p. 6
Wireless Laptopsp. 7
Consumer Issuesp. 8
Technical Issuesp. 10
Network Arrangements and Technologiesp. 11
802.11bp. 12
The Wireless Application Protocol (WAP)p. 13
Wireless Wide Area Networksp. 14
Local Area Networksp. 14
Personal Area Networks and Bluetoothp. 15
Wireless LAN Appealp. 16
Case Studiesp. 17
The Hospitalp. 17
The Office Complexp. 18
The University Campusp. 19
The Homep. 19
Security Principlesp. 21
Security Principlesp. 22
Authenticationp. 22
Access Control and Authorizationp. 23
Nonrepudiationp. 23
Privacy and Confidentialityp. 24
Integrityp. 25
Auditingp. 25
Development and Operation Principlesp. 26
Functionalityp. 27
Utilityp. 27
Usabilityp. 27
Efficiencyp. 28
Maintainabilityp. 28
Scalabilityp. 28
Testabilityp. 28
Management Principlesp. 29
Schedulep. 29
Costp. 29
Marketabilityp. 30
Marginp. 30
The Security Analysis Process--I-ADDp. 30
Identifyp. 31
Analyzep. 32
Definep. 32
Designp. 32
Repeatp. 33
The Foundationp. 34
Know Your System
Technologiesp. 39
802.11 and 802.11bp. 39
802.11 System Componentsp. 40
802.11 Architecture Modesp. 41
802.11b Physical Layerp. 43
802.11 Media Access Control Layerp. 44
802.11b Security and Wired Equivalent Privacy (WEP)p. 45
Bluetoothp. 48
Bluetooth Physical Layerp. 49
Bluetooth Protocol Architecturep. 52
Bluetooth Profilesp. 53
Bluetooth Securityp. 54
WAPp. 55
WAP Overviewp. 57
Wireless Application Environment (WAE)p. 58
WAP Securityp. 61
Devicesp. 63
Personal Digital Assistantsp. 64
Palm OS Devicesp. 66
Palm Securityp. 67
Palm OS 4.0p. 68
Pocket PC Devicesp. 68
BlackBerry (RIM 950 and 957)p. 70
BlackBerry APIsp. 71
BlackBerry Securityp. 72
Languagesp. 75
Wireless Application Protocol (WAP)p. 76
WAP Browsersp. 77
Wireless Markup Language (WML)p. 79
WMLScriptp. 83
J2MEp. 86
The Future of J2MEp. 96
Protect Your System
Cryptographyp. 99
Applied Cryptography Overviewp. 100
The Office Complex Case Studyp. 100
Primitives and Protocolsp. 103
Symmetric and Asymmetric Algorithmsp. 103
Cryptographic Attacksp. 105
Symmetric Cryptographyp. 107
Symmetric Primitivesp. 107
Symmetric Protocolsp. 112
Asymmetric Cryptographyp. 116
Asymmetric Primitivesp. 116
Asymmetric Protocolsp. 119
Common Problemsp. 122
Cryptography by Itselfp. 123
Proprietary Cryptographic Protocolsp. 123
Common Misusesp. 124
Choicesp. 127
Performancep. 128
Effectivenessp. 128
Decision Trade-Offsp. 130
Key Pointsp. 130
COTSp. 133
COTS versus Custom Softwarep. 133
Custom Softwarep. 134
Virtual Private Network (VPN)p. 135
Hardware-Based VPNsp. 138
Firewall-Based VPNsp. 139
Software-Based VPNsp. 140
Tunnelingp. 141
The Seven-Layer OSI Modelp. 141
PPTPp. 143
L2TPp. 144
IPSecp. 144
SmartCardsp. 145
Biometric Authenticationp. 146
Privacyp. 149
The Online Privacy Debate in the Wired Worldp. 149
Privacy in the Wireless Worldp. 152
The Playersp. 153
Related Privacy Legislation and Policyp. 153
The Communications Assistance for Law Enforcement Act (CALEA)p. 154
E-911p. 154
The Wireless Communications and Public Safety Act of 1999p. 156
The U.S.A. Patriot Act of 2001p. 157
Location-Based Marketing and Services and GPSp. 158
The Middle Ground Answerp. 160
Progress in the Wired Worldp. 161
I-ADD
Identify Targets and Rolesp. 165
Identify Targetsp. 165
The Wireless Devicep. 165
The Service Providerp. 171
Identify Rolesp. 175
Malicious Usersp. 175
Mapping Roles to Targetsp. 177
Analyze Attacks and Vulnerabilitiesp. 187
Known Attacksp. 187
Device Theftp. 188
The Man in the Middlep. 188
War Drivingp. 188
Denial of Servicep. 188
The DoCoMo E-Mail Virusp. 189
Vulnerabilities and Theoretical Attacksp. 189
Vulnerabilities of the Wireless Devicep. 190
Vulnerabilities of the Service Providerp. 195
Vulnerabilities of the Gatewayp. 199
Vulnerabilities of the Web Server and the Backend Serverp. 203
Analyze Mitigations and Protectionsp. 205
Protecting the Wireless Devicep. 206
Limiting the Vulnerability to Lossp. 206
Limiting the Vulnerability to Theftp. 207
Protecting the Physical Interfacep. 207
Protecting Access to the User Interfacep. 207
Protecting Personal Data on the PDAp. 208
Protecting Corporate or Third-Party Informationp. 211
Protecting Access to Network and Online Servicesp. 215
Protecting the Transceiverp. 217
Protecting Vulnerabilities of the Service Providerp. 217
Protecting the Transceiver Servicesp. 218
Protecting Access to Its Subscribersp. 219
Protecting the Transceiverp. 222
Protecting the Administrative Serverp. 222
Protecting User-Specific Datap. 222
Protecting the Network Serverp. 227
Protecting Corporate Proprietary Data and Resourcesp. 228
Protecting Vulnerabilities of the Gatewayp. 229
Prioritizingp. 229
Building Trust--Application Securityp. 231
Define and Designp. 233
The Case Studies Revisitedp. 235
The Hospitalp. 235
The Office Complexp. 239
The University Campusp. 241
The Homep. 243
Case Studies Conclusionp. 244
Just the Beginningp. 245
Afterword: The Future of Wireless Securityp. 247
Bibliographyp. 249
Indexp. 257
Table of Contents provided by Syndetics. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.