16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

716 Index<br />

Access control (continued)<br />

security policy<br />

establishment , 294<br />

mechanisms<br />

access control lists , 304<br />

advanced ACLs , 305<br />

constrained user interfaces ,<br />

306<br />

elementary ACLs , 304 , 305<br />

encryption , 303–4<br />

external access controls ,<br />

306–7<br />

host-based authentication ,<br />

308<br />

internal access controls , 303<br />

passwords , 303<br />

port protection devices , 307<br />

secure gateways, types of ,<br />

307–8<br />

secure gateways/firewalls ,<br />

307<br />

methods to bypass , 308<br />

models<br />

data categorization , 297–8<br />

discretionary access control<br />

model , 298–9<br />

mandatory access control ,<br />

296–7<br />

nondiscretionary access<br />

control model , 299–300<br />

and origins of computer<br />

security theory , 211–13<br />

purpose , 293–4<br />

uses , 300–1<br />

Access control lists (ACLs) ,<br />

304–5<br />

Access control matrix , 211<br />

Access management<br />

access control , 293<br />

administration models ,<br />

301–3<br />

criteria , 295–6<br />

entities , 294<br />

fundamental concepts , 294–5<br />

mechanisms , 303–8<br />

methods to bypass , 308<br />

models , 296–300<br />

purpose , 293–4<br />

uses , 300–1<br />

password management , 309<br />

biometric systems , 309–10<br />

characteristics , 310<br />

password attack<br />

countermeasures , 314<br />

password cracking , 311–14<br />

SmartCards , 309<br />

Access points (AP) , 56–7 , 359–60<br />

Active RFID tags , 625<br />

Address field , 99–100<br />

Address resolution protocol<br />

(ARP) , 27–8<br />

Advanced digital modulation ,<br />

120–6<br />

Advanced Encryption Standard<br />

(AES) , 242<br />

Advanced wireless security<br />

implementation<br />

802.1X RADIUS<br />

authentication,<br />

understanding and<br />

configuring , 555<br />

802.1X standard , 557–60<br />

Microsoft RADIUS servers ,<br />

556<br />

using EAP-TLS on<br />

Microsoft network ,<br />

560–79<br />

Linksys WRV54G VPN<br />

broadband router , 525<br />

Linksys WRV54G, enabling<br />

VPN on , 534–6<br />

Windows 2000/XP<br />

computers preparation,<br />

for use with WRV54G ,<br />

526–34<br />

RADIUS with Cisco LEAP,<br />

implementing , 536<br />

LEAP, configuring , 546–51<br />

LEAP features , 538–9<br />

LEAP solution, building , 539<br />

review , 554–5<br />

Steel Belted RADIUS,<br />

installing and configuring ,<br />

540–6<br />

Windows Active Directory<br />

domain authentication,<br />

with LEAP and RADIUS ,<br />

551–4<br />

wireless gateway with<br />

Reef Edge Dolphin,<br />

implementing , 511<br />

Dolphin, configuring ,<br />

519–23<br />

Dolphin, installing , 514–19<br />

review , 525<br />

user experience, improving ,<br />

523–5<br />

WPA implementation , 503<br />

D-Link DI-624 AirPlus 2.4<br />

GHz Xtreme G wireless<br />

router with 4-port switch,<br />

configuring , 504–6<br />

Linksys WRV54G VPN<br />

broadband router,<br />

configuring , 506–8<br />

Windows XP wireless Clients,<br />

configuring , 508–10<br />

AiroPeek NX , 344<br />

Analog baseband conditioning ,<br />

110–11<br />

Analog communication , 119–20<br />

Analog transmission , 106<br />

Antennas , 355–6<br />

and WLAN equipment, use<br />

of , 355<br />

wireless cards , 356<br />

Antivirus software installation ,<br />

595<br />

ARQ (automatic repeat query)<br />

protocol , 105<br />

Attacks and risks , 193<br />

employee sabotage , 197–8<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!