Wireless security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Jersey
Science Publ. [u.a.]
2012
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVII, 212 S. Ill. |
ISBN: | 9781578087686 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040445357 | ||
003 | DE-604 | ||
005 | 20121025 | ||
007 | t | ||
008 | 120927s2012 a||| |||| 00||| eng d | ||
020 | |a 9781578087686 |9 978-1-57808-768-6 | ||
035 | |a (OCoLC)815935169 | ||
035 | |a (DE-599)OBVAC09359185 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Osterhage, Wolfgang W. |d 1948- |e Verfasser |0 (DE-588)132702363 |4 aut | |
245 | 1 | 0 | |a Wireless security |c Wolfgang Osterhage |
264 | 1 | |a Jersey |b Science Publ. [u.a.] |c 2012 | |
300 | |a XVII, 212 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025293105&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-025293105 |
Datensatz im Suchindex
_version_ | 1804149503707578368 |
---|---|
adam_text | Contents
Preface
V
Abbreviations
xiii
1.
Introduction
1
2.
WLAN
3
2.1
WLAN Basic Principles
3
2.1.1
Advantages of Wireless Networks
3
2.1.2
General Features of Wireless Networks
5
2.1.3
Standards
6
2.1.4
Connecting to Computers
9
2.1.5
Antennas
10
2.2
IEEE
802.11
Overview
11
2.2.1
The Standard
802.11
and its Extensions
12
2.3
Wireless Fidelity
18
2.3.1
Wi-Fi Protected Access
19
2.4
WMAN
19
2.5
Key Terminology
20
2.5.1
WLAN Components
20
2.5.2
Bandwidth
20
2.5.3
Range
21
2.5.4
Channels
22
2.5.5
Channel Separation
22
2.6
Architecture and Components
23
2.6.1
Data Transmission and Synchronization
23
2.6.2
Network Topologies
26
2.6.3
Special Aspects
28
2.6.4
WLAN Architectures
29
2.6.5
WLAN Components
40
2.6.6
Configuring a WLAN
43
VIII Contents
2.7
Security Requirements
46
2.7.1
Assuring Availability
47
2.7.2
Assuring Data Integrity
47
2.7.3
Assuring Authenticity
47
2.7.4
Assuring Confidentiality
48
2.7.5
Security Risks
48
2.7.6
Physical Layer
50
2.7.7
Medium Access Layer
54
2.8
Recent Developments
66
2.8.1
White Spaces
66
2.8.2
The
802.1
lac and
802.1
lad Standards
66
2.8.3
Mobile Hotspots
67
2.9
Applications
67
2.9.1
A Small Home WLAN
67
2.9.2
Hot Spot Services
68
2.9.3
WLAN Solutions for a Hospital
68
2.10
Checklist
70
3.
PDAs
79
3.1
Other Wireless Technologies
79
3.2
Hardware Components
80
3.2.1
PDAs
80
3.2.2
BlackBerries
83
3.2.3
Printers
85
3.3
Standards
86
3.3.1
802.11b
86
3.3.2 802.11g 87
3.4
Configuration
87
3.4.1
Access Points
87
3.4.2
PDA Adapter
88
3.4.3
Integrated WLAN Functions
90
3.5
Security Aspects
91
3.5.1
Basic Security Risks
92
3.5.2
Strategic Countermeasures
92
3.5.3
Organizational Countermeasures
94
3.5.4
Specific Risk Potentials
99
Contents DC
3.5.5 Special
Case BlackBerries
102
3.5.6
PDA Directive
106
3.6
Checklist
109
4.
Mobile Phones
119
4.1
Context
119
4.2
Basic Principles
120
4.2.1
Communication Structure
120
4.2.2
Device Architecture
121
4.3
Operating Systems
124
4.3.1
GSM
124
4.3.2
GPRS
125
4.3.3
UMTS
125
4.4
Services
126
4.4.1
SMS/EMS/MMS
127
4.4.2
WAP
127
4.4.3
i-mode
127
4.5
Mobile Phones and WLAN
127
4.5.1
Infrastructure
128
4.5.2
Terminal Devices
129
4.6
Threats and Protection
129
4.6.1
General Risk Potentials and Strategic
Countermeasures
129
4.6.2
Specific Threat Scenarios Concerning
Mobile Phones
133
4.6.3
General Precautionary Measures
138
4.7
Special Case BlackBerries
139
4.8
Smart Phones
141
4.8.1
iPhone
142
4.8.2
VoIP
144
4.9
Security Check
144
4.10
Directive
146
4.11
Checklist
148
5.
Bluetooth
157
5.1
Introduction
157
X
Contents
5.2 Technical Basics 157
5.2.1
Protocols
158
5.2.2 System
Topology
160
5.3
Configuration
162
5.3.1
Options
162
5.3.2
Configuration
163
5.3.3
Connecting to the Network
164
5.4
Security Aspects
165
5.4.1
Instruments
165
5.4.2
Risk Potentials
168
5.4.3
Countermeasures
170
5.5
The Future
171
5.5.1
Enhancement
172
5.5.2
New Areas of Deployment
172
5.5.3
Bluetooth
4.0 172
5.6
Checklist
173
6.
Infrared
177
6.1
Background
177
6.2
IrDA
177
6.2.1
General Considerations
178
6.2.2
Protocol
180
6.3
Applications
181
6.3.1
Terminal Devices
181
6.3.2
Preconditions
182
6.3.3
Communication
182
6.4
Security Aspects
185
6.5
Checklist
186
7.
Security Policy
187
7.1
Introduction
187
7.1.1
Security Requirements
187
7.1.2
Risks
188
7.1.3
Measures
188
7.2
Scope
189
7.2.1
Normative References
189
Contents XI
7.3
Information
and Communication Security
190
7.3.1
Strategic Involvement
191
7.3.2
Security Organization
193
7.3.3
Approval Process
194
7.3.4
Confidentiality
194
7.4
Physical Security
194
7.4.1
Objects
195
7.4.2
Access
195
7.4.3
Threats
195
7.4.4
Equipment
196
7.4.5
Utility Services
196
7.4.6
Disposal
196
7.5
Documentation
197
7.5.1
Processes
197
7.5.2
Commitment
198
7.6
Wireless Security
199
7.7
Summary
200
References
203
Index
209
|
any_adam_object | 1 |
author | Osterhage, Wolfgang W. 1948- |
author_GND | (DE-588)132702363 |
author_facet | Osterhage, Wolfgang W. 1948- |
author_role | aut |
author_sort | Osterhage, Wolfgang W. 1948- |
author_variant | w w o ww wwo |
building | Verbundindex |
bvnumber | BV040445357 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)815935169 (DE-599)OBVAC09359185 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01435nam a2200361 c 4500</leader><controlfield tag="001">BV040445357</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20121025 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">120927s2012 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781578087686</subfield><subfield code="9">978-1-57808-768-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)815935169</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)OBVAC09359185</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Osterhage, Wolfgang W.</subfield><subfield code="d">1948-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)132702363</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Wireless security</subfield><subfield code="c">Wolfgang Osterhage</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Jersey</subfield><subfield code="b">Science Publ. [u.a.]</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 212 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025293105&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025293105</subfield></datafield></record></collection> |
id | DE-604.BV040445357 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:24:04Z |
institution | BVB |
isbn | 9781578087686 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025293105 |
oclc_num | 815935169 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG |
owner_facet | DE-473 DE-BY-UBG |
physical | XVII, 212 S. Ill. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Science Publ. [u.a.] |
record_format | marc |
spelling | Osterhage, Wolfgang W. 1948- Verfasser (DE-588)132702363 aut Wireless security Wolfgang Osterhage Jersey Science Publ. [u.a.] 2012 XVII, 212 S. Ill. txt rdacontent n rdamedia nc rdacarrier Datensicherung (DE-588)4011144-1 gnd rswk-swf Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 s Datensicherung (DE-588)4011144-1 s Softwareschwachstelle (DE-588)4752508-3 s DE-604 Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025293105&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Osterhage, Wolfgang W. 1948- Wireless security Datensicherung (DE-588)4011144-1 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4752508-3 (DE-588)4633975-9 |
title | Wireless security |
title_auth | Wireless security |
title_exact_search | Wireless security |
title_full | Wireless security Wolfgang Osterhage |
title_fullStr | Wireless security Wolfgang Osterhage |
title_full_unstemmed | Wireless security Wolfgang Osterhage |
title_short | Wireless security |
title_sort | wireless security |
topic | Datensicherung (DE-588)4011144-1 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd |
topic_facet | Datensicherung Softwareschwachstelle Drahtloses lokales Netz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025293105&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT osterhagewolfgangw wirelesssecurity |