PART ONE Introduction to Wireless and Mobile Networks
CHAPTER 1 The Evolution of Data Networks
The Dawn of Data Communication
Advances in Personal Computers
Mobile Phones and the Creation of the Other New Network
The Convergence of Mobile and Data Networks
Business Challenges Addressed by Wireless Networking
The Impact of Bring Your Own Device
BYOD: An IT Perspective and Policy
The Basic Tenets of Network Security
CHAPTER 2 The Evolution of Wired Networking to Wireless Networking
Networking and the Open System Interconnection Reference Model
The Seven Layers of the OSI Reference Model
The Economic Impact of Wireless Networking
Wireless Networking and the Way People Work
General Business and Knowledge Workers
How Wi-Fi Affects Developing Nations
CHAPTER 3 The Mobile Revolution
Introduction to Cellular or Mobile Communication
The Evolution of Mobile Networks
BYOD and the BlackBerry Effect
The Economic Impact of Mobile IP
The Business Impact of Mobility
Any Business Involving the Moving of People or Things
Delivery (Drop Off) Loss Mitigation
Enterprise Business Management Applications
CHAPTER 4 Security Threats Overview: Wired, Wireless, and Mobile
Threats to Wireless and Mobile Devices
BYOD for Small-to-Medium Businesses
Authorization and Access Control
Information Security Standards
The Payment Card Industry Data Security Standard
Detrimental Effects of Regulations
Narrowband and Spread Spectrum
Frequency Hopping Spread Spectrum
Direct Sequence Spread Spectrum
Spectrum and Protocol Analysis
CHAPTER 6 WLAN and IP Networking Threat and Vulnerability Analysis
Skilled Versus Unskilled Attackers
Targets of Opportunity Versus Specific Targets
Scouting for a Targeted Attack
Physical Security and Wireless Networks
Bluetooth Vulnerabilities and Threats
Wireless Networks and Information Theft
Malicious Data Insertion on Wireless Networks
Peer-to-Peer Hacking over Ad Hoc Networks
When an Attacker Gains Unauthorized Control
CHAPTER 7 Basic WLAN Security Measures
Design and Implementation Considerations for Basic Security
Equipment Configuration and Placement
Authentication and Access Restriction
Authentication and Association
Ongoing Management Security Considerations
Identifying Rogue WLANs/Wireless Access Points
CHAPTER 8 Advanced WLAN Security Measures
Establishing and Enforcing a Comprehensive Security Policy
Centralized Versus Distributed Design and Management
Employee Training and Education
Implementing Authentication and Access Control
Extensible Authentication Protocol
Remote Authentication Dial-In User Service
Intrusion Detection Systems and Intrusion Prevention Systems
Authenticated Dynamic Host Configuration Protocol
WPA2 Personal and Enterprise Modes
Malware and Application Security
Demilitarized Zone Segmentation
Managing Network and User Devices
Simple Network Management Protocol Version 3
Coverage Area and Wi-Fi Roaming
Client Security Outside the Perimeter
Device Management and Use Logons
Security Auditor’s Research Assistant
Password-Capture and Decryption Tools
Network Management and Control Tools
WLAN Hardware Audit Tools and Antennas
CHAPTER 10 WLAN and IP Network Risk Assessment
Other Types of Risk Assessment
Other Justifications for Risk Assessments
Security Risk Assessment Stages
Identifying and Implementing Controls
CHAPTER 11 Mobile Communication Security Challenges
Mobile Phone Threats and Vulnerabilities
Exploits, Tools, and Techniques
Google Android Security Challenges
Android Application Architecture
Windows Phone Security Challenges
Windows Phone Security Architecture
CHAPTER 12 Mobile Device Security Models
Security Challenges of Handoff-Type Features
Security Using Enterprise Mobility Management
CHAPTER 13 Mobile Wireless Attacks and Remediation
Scanning the Corporate Network for Mobile Attacks
Scanning the Network: What to Look For
The Kali Linux Security Platform
Client and Infrastructure Exploits
Network Security Protocol Exploits
Public Certificate Authority Exploits
Developer Digital Certificates
Browser Application and Phishing Exploits
Mobile Software Exploits and Remediation
Insufficient Transport Layer Protection
Poor Authorization and Authentication
Security Decisions via Untrusted Inputs
CHAPTER 14 Fingerprinting Mobile Devices
Is Fingerprinting a Bad or a Good Thing?
Network Scanning and Proximity Fingerprinting
Online or Remote Fingerprinting
New Methods of Mobile Fingerprinting
CHAPTER 15 Mobile Malware and Application-Based Threats
Criminal and Developer Collaboration
Excessive Application Permissions
Malware on Windows Phone Devices
Mobile Malware Delivery Methods
Mobile Malware and Social Engineering
Mitigating Mobile Browser Attacks