Index

[SYMBOL][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W]

SYMBOL



802.11 enhancements
  mesh networking
  MIMO and data rates
  network performance and roaming
    fast BSS transitions
    Radio Resource Measurement Enhancements
  quality of service
  spectrum management
    dynamic frequency selection
    transmit power control

802.11 MAC layer
  discovering and joining network
  distribution system services
  station services
  wireless media access

802.11 PHY layer


802.11 WLAN standards
  characteristics
  enhancements
    mesh networking
    MIMO and data rates
    network performance and roaming
    quality of service
    spectrum management
  HiperLAN/2,
  Home Radio Frequency
  MAC layer
    discovering and joining network
    distribution system services
    station services
    wireless media access
  origins and evolution
  PHY layer
    802.11a PHY layer
    802.11b PHY layer
    802.11g PHY layer
    data rates, at PHY and MAC layer

802.11a PHY layer
2nd

802.11a protocol
2nd3rd

802.11b PHY layer
2nd

802.11b protocol
2nd3rd

802.11g PHY layer
2nd

802.11g protocol
2nd3rd

802.1X RADIUS authentication, understanding and configuring
  802.1X standard
  Microsoft RADIUS servers
  using EAP-TLS on Microsoft network

802.1X standard
2nd

A



ABC Inc. InfoSec Acceptable Use Policy


ABC Inc. InfoSec Anti-Virus Policy


ABC Inc. InfoSec Application Password Policy


ABC Inc. InfoSec Audit Policy


ABC Inc. InfoSec De-Militarized Zone (DMZ) Policy


ABC Inc. InfoSec Dial-In Access Policy


ABC Inc. InfoSec Extranet Policy


ABC Inc. InfoSec Network Policy


ABC Inc. InfoSec Password Policy


ABC Inc. InfoSec Policy Exception Form


ABC Inc. InfoSec Remote Access Policy


ABC Inc. InfoSec Risk Assessment Policy


ABC Inc. InfoSec Router Policy


ABC Inc. InfoSec Server Policy


ABC Inc. InfoSec VPN Communication Policy


ABC Inc. InfoSec Wireless Communication Policy


Access control
  administration models
    centralized administration model
    decentralized administration model
    hybrid administration model
  and origins of computer security theory
  criteria
  entities
  fundamental concepts
    accountability
    assurance
    security policy establishment
  mechanisms
    access control lists
    advanced ACLs
    constrained user interfaces
    elementary ACLs
    encryption
    external access controls
    host-based authentication
    internal access controls
    passwords
    port protection devices
    secure gateways, types of
    secure gateways/firewalls
  methods to bypass
  models
    data categorization
    discretionary access control model
    mandatory access control
    nondiscretionary access control model
  purpose
  uses

access control lists


Access control lists (ACLs)


Access control matrix


access control, and origins of computer security theory


Access management
  access control
    administration models
    criteria
    entities
    fundamental concepts
    mechanisms
    methods to bypass
    models
    purpose
    uses
  password management
    biometric systems
    characteristics
    password attack countermeasures
    password cracking
    SmartCards

access points
2nd3rd4th

Access points (AP)


accountability


Active RFID tags


address field


Address field


address resolution protocol
2nd

Address resolution protocol (ARP)


administration models


advanced ACLs


advanced digital modulation
2nd

Advanced digital modulation


Advanced Encryption Standard (AES)


Advanced wireless security implementation
  802.1X RADIUS authentication, understanding and configuring
    802.1X standard
    Microsoft RADIUS servers
    using EAP-TLS on Microsoft network
  Linksys WRV54G VPN broadband router
    Linksys WRV54G, enabling VPN on
    Windows 2000/XP computers preparation, for use with WRV54G
  RADIUS with Cisco LEAP, implementing
    LEAP features
    LEAP solution, building
    LEAP, configuring
    review
    Steel Belted RADIUS, installing and configuring
    Windows Active Directory domain authentication, with LEAP and RADIUS
  wireless gateway with Reef Edge Dolphin, implementing
    Dolphin, configuring
    Dolphin, installing
    review
    user experience, improving
  WPA implementation
    D-Link DI-624 AirPlus 2.4 GHz Xtreme G wireless router with 4-port switch, configuring
    Linksys WRV54G VPN broadband router, configuring
    Windows XP wireless Clients, configuring

advantages
2nd

advantages of
2nd3rd

AiroPeek NX
2nd

algorithms


alternatives
2nd

an introduction


analog baseband conditioning
2nd

Analog baseband conditioning


analog communication
2nd

Analog communication


analog transmission
2nd

Analog transmission


and authentication


and future
2nd

and handoffs


and MIMO


and origins of computer security theory


and protocols


anonymity in
2nd3rd

anonymity, in GSM


anonymity, in UMTS


antennas
2nd3rd

Antennas
  and WLAN equipment, use of
    wireless cards

antivirus software installation
2nd

Antivirus software installation


ARQ (automatic repeat query) protocol


arrays
2nd

assurance


at PHY and MAC layer


attack objectives


attacks


Attacks and risks
  employee sabotage
  fraud and theft
  industrial espionage
  infrastructure attacks
  internet fraud
  malicious coders
  malicious hackers
  personal privacy, threats to
  social engineering
    corporate social engineering policy, crafting
    staff and security personnel, educating

audits


authentication
2nd3rd4th5th

authentication in
2nd3rd

authentication weaknesses, exploiting
2nd3rd

Authentication, in 802.11 networks
  and handoffs
  drawbacks
  open system authentication
  pseudo-authentication schemes
  shared key authentication

authentication, in GSM


authentication, in UMTS

B



backend


bandwidth
2nd

Bandwidth


baseband coding


Baseband coding
  analog baseband conditioning
  digital systems

baseband data format and protocol


Baseband data format and protocol
  analog transmission
  change-of-state source data
    address field
    baseband data rate
    code-hopping addressing technique
    data field
    dip switch
    internal fixed code identity
    parity bit field
    supervision
  continuous digital data

baseband data rate


Baseband data rate


basics
2nd

biometric systems
2nd

Biometric systems


blended attacks


Blended attacks


blending attacks


Bluetooth
2nd3rd
  authentication
  basics
  confidentiality
  enhancements
  features
  integrity protection
  key establishment
    algorithms
    broadcast key hierarchy
    constraint key
    encryption key
    Initialization Key
    Link Key
    Pass Key
    payload key
  security modes

bluetooth and WPANs


Bluetooth devices


broadcast key hierarchy

C



capacity


cards


Cards


Carrier sense multiple access/collision detection (CSMA/CD)


cellular technologies
2nd

Cellular technologies


centralized administration model


change-of-state source data


Change-of-state source data


changing


characteristics
2nd3rd

Chip


choosing


civil structure monitoring


client hijacking
2nd

Client hijacking


Closed system authentication


code security


Code security


code-hopping addressing technique


Code-hopping addressing technique


Communication protocols and modulation
  baseband coding
    analog baseband conditioning
    digital systems
  baseband data format and protocol
    analog transmission
    change-of-state source data
    continuous digital data
  modulation
    advanced digital modulation
    analog communication
    continuous digital communication
    for digital event communication
    spread spectrum
  RF frequency and bandwidth
  RFID

Communication service providers, emergency disclosures by


communications providers, emergency disclosures by


computer trespassers, intercepting communications of


confidentiality
2nd3rd4th

confidentiality in
2nd3rd

confidentiality weaknesses, exploiting
2nd3rd

confidentiality, in GSM


confidentiality, in UMTS


configuring
2nd3rd4th

connection


constrained user interfaces


Constrained user interfaces


constraint key


Constraint key


constraints
2nd

continuous digital communication


Continuous digital communication
  digital modulation methods, comparison of
  phase shift keying

continuous digital data
2nd

Continuous digital data


Corporate social engineering policy
  audits
  prevention

corporate social engineering policy, crafting
2nd

Credit cards


criteria
2nd

cryptographic algorithms


cryptographic weaknesses, exploiting
2nd3rd

cryptography


Cryptography
  and protocols
  cryptographic algorithms
    choosing
  hashing
  in practice
  needs of
  optimization
  tailoring security

cryptography and protocols


cryptography in practice


current standards


cybersecurity forensic capabilities, development of


cyberterrorism, deterrence and prevention of


Cyberterrorism, deterrence and prevention of

D



damage aggregation


damaging computers, for national security/criminal justice purposes


data categorization


data field


Data field


data flooding
2nd

Data flooding


Data integrity
  and authentication
  in 802.11,

data integrity in


data integrity weaknesses, exploiting
2nd3rd

Data link layer technologies
  logical link control
  MAC
    in wired networks
    in wireless networks

Data rates
  and MIMO
  at PHY and MAC layer

data rates, at PHY and MAC layer


decentralized administration model


decryption tools


definition


Denial-of-service attacks and tools
  client hijacking
  data flooding
  RF jamming

diffraction


Diffraction


digital certificates


Digital certificates


Digital event communication, modulation for


digital modulation methods, comparison of
2nd

Digital modulation methods, comparison of


digital signatures


Digital signatures


digital systems
2nd

Digital systems


dip switch


Dip switch


direct sequence


Direct sequence spread spectrum (DSSS)
  advantages

disadvantages of


discovering and joining network
2nd

Discretionary access control


discretionary access control model


distribution system services
2nd

diversity implementation


Diversity techniques
  frequency diversity
  implementation
  polarization diversity
  space diversity
  statistical performance measure

D-Link DI-624 AirPlus 2.4 GHz Xtreme G wireless router with 4-port switch
  configuring
  enabling security features on
    MAC address, filtering by
    SSID broadcast, disabling
    unique SSID, setting
    WEP, enabling

D-Link DI-624 AirPlus 2.4 GHz Xtreme G wireless router with 4-port switch, configuring
2nd

Dolphin implementation
  configuring
  installing
  user experience, improving

Dolphin review


Dolphin, configuring
2nd

Dolphin, installing
2nd

drawbacks
2nd

drowning, in acronyms
2nd

DSSS and FHSS, advantages of


dynamic frequency selection
2nd

Dynamic frequency selection


Dynamic NAT

E



effects


electronic evidence, scope of subpoenas for


Electronic Product Code


elementary ACLs


emitter beam pattern


Emitter beam pattern


employee sabotage


Employee sabotage


encryption


Encryption and password protection


encryption in


encryption key


Encryption key


encryption, in wireless network
2nd

enhancements
2nd

entities
2nd

establishment
2nd3rd

establishment in
2nd

establishment protocol of


establishment, in GSM


establishment, in UMTS


Ethernet


ethics


Ettercap
2nd3rd

exploitable WLAN configurations


exposed terminal problem
2nd

Exposed terminal problem


external access controls


External access controls

F



fast BSS transitions
2nd

Fast BSS transitions


fast track solutions


features


FireWire


first generation


Fixed gain antennas


fixed wireless MAN antennas
2nd

Fixed wireless MAN antennas


fixed wireless MAN devices
2nd

Fixed wireless MAN devices


Flat fading
  Rayleigh fading

for digital event communication
2nd

for self-defense


fraud and theft


frequency diversity
2nd

Frequency diversity


frequency hopping


Frequency hopping spread spectrum (FHSS)
  advantages

fundamental concepts


future developments


future standards

G



GSM
  anonymity in
  authentication in
  confidentiality in
  establishment in
  vulnerability in

H



hacker's intent vs. degree of damages


hackers, raising maximum penalty for


hardware


hardware devices


hashing


Hashing


hidden terminal problem
2nd

Hidden terminal problem


HiperLAN/2,
2nd

history
2nd

Home network security
  hotspot security measures
  measures
    antivirus software installation
    encryption, in wireless network
    home wireless network, securing
    logs, reviewing
    personal firewall installation
    public wireless networks
    restrict access, to wireless network
    SSID, changing
    wireless network, configuring
  wireless networks
    802.11a protocol
    802.11b protocol
    802.11g protocol
    next-generation protocols

Home Radio Frequency


Home Radio Frequency (HomeRF)


home wireless network, securing
2nd

Homeland Security Act (2002)
2nd

host-based authentication


hotspot security measures


Hotspots
  connection
  security measures

hybrid administration model


hybrid star and mesh network


Hybrid star and mesh network

I



Identification Friend and Foe (IFF)


Identity-based discretionary access control


IEEE 1451.5 standard


IEEE 802.11 standard


IEEE 802.11a standard


IEEE 802.11b standard


IEEE 802.11g standard


IEEE 802.11h standard


IEEE 802.15.4 standard
2nd3rd

IEEE1451.5 standard
2nd

IEEE802.11 standard


IEEE802.11x


implementation


in 802.11,


in practice
2nd

in wired networks
2nd

in wireless networks
2nd

industrial automation


industrial espionage


Industrial espionage


Infrared (Ir) communication
  Ir spectrum
  propagation and reception
    emitter beam pattern
    inverse square loss
    Ir detector sensitivity
    Ir link distance
    transmitted power density

infrastructure attacks


Initialization Key


Initialization Key (IK/K INIT)


Initialization vector


installing


Integrated Services Digital Network (ISDN)


integrity
2nd

integrity protection
2nd

integrity protection in


integrity protection, in UMTS


intercepting


internal access controls


internal fixed code identity


Internal fixed code identity


internet fraud


Internet fraud


Internet Protocol Version
2nd

Internet Protocol Version 6 (IPv6)


Intrusion process
  antennas and WLAN equipment, use of
    antennas
    wireless cards
  denial-of-service attacks and tools
    client hijacking
    data flooding
    RF jamming
  exploitable WLAN configurations
  network access to WLAN
    authentication weaknesses, exploiting
    confidentiality weaknesses, exploiting
    cryptographic weaknesses, exploiting
    data integrity weaknesses, exploiting
    MAC address spoofing and circumventing filters
    rogue AP exploitation
    WEP decryption tools
    WLAN attacks
  password gathering, and cracking software
    Ettercap
    L0phtCrack
    Lucent Registry Crack
    WinSniffer
    wireless protocol analyzers
  publicly available resources
  rogue devices, as exploitation tools
    access points
    wireless bridges
  share enumerators
  social engineering
  target profiling
  war-driving, -walking, -flying, and –chalking
    network discovery tools
    networking utilities
    WLAN audit and discovery tools

inverse square loss


Inverse square loss


investigations


IP addressing
2nd3rd

IPSEC
2nd

Ir detector sensitivity
2nd

Ir link distance
2nd

Ir spectrum
2nd

J



John the Ripper
2nd

K



key fobs


Key fobs


Kismet
2nd

L



L0phtCrack
2nd3rd

Label


LANs


LEAP features


LEAP solution, building
2nd

LEAP, configuring
2nd

lightweight access point protocol
2nd

Lightweight access point protocol


Link Key


Link Key (LK)


Linksys BEFW11 SR 802.11b access point/router, enabling security features on
  MAC address, filtering by
  SSID broadcast, disabling
  unique SSID, setting
  WEP, enabling

Linksys WAP11 802.11b access point, enabling security features on
  SSID broadcast, disabling
  unique SSID, setting
  WEP, enabling

Linksys WRT54G 802.1 lb/g access point/router, enabling security features on
  MAC address, filtering by
  SSID broadcast, disabling
  unique SSID, setting
  WEP, enabling

Linksys WRV54G VPN broadband router
  configuring
  Linksys WRV54G, enabling VPN on
  Windows 2000/XP computers preparation, for use with WRV54G

Linksys WRV54G VPN broadband router, configuring
2nd

Linksys WRV54G, enabling VPN on
2nd

Linux clients, configuring
2nd3rd

Local area networks (LANs)


logical link control
2nd

Logical link control (LLC)


logs, reviewing
2nd

Logs, reviewing


loopholes in security


loss, definition of


Loss, definition of


Lucent Registry Crack
2nd

Lucent Registry Crack (LRC)

M



MAC


MAC address spoofing and circumventing filters
2nd3rd

MAC address, filtering by
2nd3rd4th5th6th7th

MAC in
2nd

malicious coders


Malicious coders


malicious hackers


Malicious hackers


management
2nd

mandatory access control


mandatory minimum sentences elimination


MANET


mechanisms


mechanisms of


Media access control (MAC)
  addressing
    spoofing and circumventing filters
  in wired networks
  in wireless networks

mesh network


mesh networking
2nd

mesh networks
2nd

Mesh networks


message digests


methods to bypass
2nd

Microsoft RADIUS servers
2nd3rd

middleware
2nd

Middleware software


MIMO and data rates
2nd

MIMO, and data rates


MiniStumbler
2nd

mobile wireless MAN devices
2nd

Mobile wireless MAN devices


models


modulation


Modulation
  advanced digital modulation
  analog communication
  continuous digital communication
    digital modulation methods, comparison of
    phase shift keying
  for digital event communication
  spread spectrum
    direct sequence
    DSSS and FHSS, advantages of
    frequency hopping

multipath phenomena


Multipath phenomena

N



National Information Infrastructure Protection Act (1996)
2nd

nationwide search warrants for e-mail


Near Field


needs of


NetStumbler
2nd

Network access, to WLAN
  authentication weaknesses, exploiting
  confidentiality weaknesses, exploiting
  cryptographic weaknesses, exploiting
  data integrity weaknesses, exploiting
  MAC address spoofing and circumventing filters
  rogue AP exploitation
  WEP decryption tools
  WLAN attacks

network address translation
2nd

Network address translation (NAT)


network discovery tools


Network discovery tools


network domain security
2nd

Network layer technologies
  address resolution protocol
  Internet Protocol Version
  IP addressing
  network address translation
  port address translation
  private IP addresses
  routing

Network name


network performance and roaming


Network performance and roaming
  fast BSS transitions
  Radio Resource Measurement Enhancements

networking utilities


Networking utilities


next-generation protocols
2nd

Next-generation protocols


noise


Noise


nondiscretionary access control model

O



obtaining


open field propagation


Open field propagation


open system authentication


Open Systems Interconnect (OSI) model


operating system considerations


Operating system considerations


optimization


origins and evolution


OSI network model

P



“protected computer” and computers in foreign countries


parity bit field


Parity bit field


Pass Key


Pass Key (PKEY)


Passive RFID tags


password attack countermeasures
2nd

password cracking


Password gathering, and cracking software
  Ettercap
  L0phtCrack
  Lucent Registry Crack
  WinSniffer
  wireless protocol analyzers

Password management
  biometric systems
  characteristics
  password attack countermeasures
  password cracking
    for self-defense
    John the Ripper
    Unix “Crack”,
    Windows NT L0phtCrack
  SmartCards

passwords


path loss


Path loss


payload key


Payload key (PK)


pen register and trap and trace statute


performance
2nd

personal firewall installation
2nd

Personal firewall installation


personal privacy, threats to


phase shift keying
2nd

Phase shift keying (PSK)


physical layer technologies
2nd

Physical layer technologies
  wired networks
  wireless networks

planning


point-to-point connections
2nd

polarization diversity
2nd

Polarization diversity


port address translation
2nd

Port address translation


port protection devices


Port protection devices (PPD)


power consideration in


power consumption


power over Ethernet


President's Executive Order, on critical infrastructure protection
2nd

prevention


private IP addresses
2nd

Private IP addresses


protocol madness


protocols


pseudo-authentication schemes


Pseudo-authentication schemes, in 802.11,


public wireless networks
2nd

Public wireless networks


public-key cryptography


Public-key cryptography


Public-Key Infrastructure (PKI) 252–4,
  alternatives

Public-Key Infrastructures


publicly available resources


purpose
2nd

Q



Quadrature amplitude modulation (QAM)


quality of service
2nd

R



Radio communication
  communication protocols and modulation
    baseband coding
    baseband data format and protocol
    modulation
    RF frequency and bandwidth
    RFID
  diffraction
  diversity techniques
    diversity implementation
    frequency diversity
    polarization diversity
    space diversity
    statistical performance measure
  flat fading
    rayleigh fading
  multipath phenomena
  noise
  open field propagation
  path loss
  radio wave propagation, mechanisms of
  scattering

Radio frequency identification (RFID) security
  architecture
    middleware
    reader
    tag/label
  data communications
    protocols
    tag data
  management
    risk and vulnerable assessment
    risk management
    threat management
  physical form factor
    cards
    key fobs
  radio waves
  threat and target identification
    attack objectives
    blending attacks

radio frequency manipulation


Radio options, for physical layer
  Bluetooth
  IEEE 802.15.4 standard
  IEEE1451.5 standard
  IEEE802.11 standard
  ZigBee

radio propagation effects
2nd

Radio Resource Measurement Enhancements
2nd3rd

radio wave propagation, mechanisms of


radio waves


Radio waves
  propagation
    effects
    mechanisms of

RADIUS with Cisco LEAP, implementing
  features
    LEAP solution, building
  LEAP, configuring
  review
  Steel Belted RADIUS, installing and configuring
  Windows Active Directory domain authentication, with LEAP and RADIUS

rayleigh fading


Rayleigh fading
2nd

reader


Reader


requirements of


restrict access to


restrict access, to wireless network
2nd

review
2nd3rd

RF frequency and bandwidth
2nd

RF frequency, and bandwidth


RF jamming
2nd3rd

RFID
2nd

risk and vulnerable assessment


risk management


Risk, definition


Robust Security Network (RSN)


rogue AP exploitation
2nd3rd

Rogue AP exploitation


Rogue devices, as exploitation tools
  access points
  wireless bridges

routing
2nd

Routing

S



scattering


Scattering


scope of cable act, clarifying


secure gateways, types of


secure gateways/firewalls


Secure gateways/firewalls
  types of

Secure Shell


Secure Shell (SSH)


Secure Sockets Layer (SSS)
  history
  in practice
  Public-Key Infrastructure
    alternatives
  session
  under hood

Security
  access control, and origins of computer security theory
  and law
    communications providers, emergency disclosures by
    computer trespassers, intercepting communications of
    cybersecurity forensic capabilities, development of
    cyberterrorism, deterrence and prevention of
    damage aggregation
    damaging computers, for national security/criminal justice purposes
    electronic evidence, scope of subpoenas for
    ethics
    hacker's intent vs. degree of damages
    hackers, raising maximum penalty for
    Homeland Security Act (2002)
    investigations
    loss, definition of
    mandatory minimum sentences elimination
    National Information Infrastructure Protection Act (1996)
    nationwide search warrants for e-mail
    pen register and trap and trace statute
    President's Executive Order, on critical infrastructure protection
    “protected computer” and computers in foreign countries
    scope of cable act, clarifying
    state convictions counting as “prior offenses”,
    USA Patriot Act (2001)
    voice communications, intercepting
    voice-mail, obtaining
    wiretapping procedures, changes to
  data integrity and authentication
    digital certificates
    digital signatures
    message digests
    Public-Key Infrastructures
  definition
  policies
    cryptography
    public-key cryptography
    symmetric cryptography

security measures


security modes
2nd

security policy establishment


security process


Semi-passive tags


Service Set Identifier (SSID)
  changing

session


Shadow fading


share enumerators


Share enumerators


shared key authentication


Shared key authentication (SKA)


SIM cloning


Sliding correlator


smart antennas


Smart antennas


SmartCards
2nd3rd

Sniffer wireless


Sniffer Wireless


social engineering


Social engineering
  corporate social engineering policy, crafting
  staff and security personnel, educating

space diversity
2nd

Space diversity


spectrum management


Spectrum management
  dynamic frequency selection
  transmit power control

spoofing and circumventing filters


spread spectrum


Spread spectrum
  direct sequence
    advantages of
  frequency hopping
    advantages of

SSID broadcast, disabling
2nd3rd4th5th6th7th8th

SSID, changing
2nd

staff and security personnel, educating
2nd

Standardized security
  cryptography and protocols
  history
  in practice
    cryptographic algorithms
    cryptography in practice
  popular alternative protocols
    IPSEC
    Secure Shell
    Wrap-Up
  protocol madness

star network


Star network


star topologies


star topologies, in wireless networks


state convictions counting as “prior offenses”,


Static NAT


station services
2nd

statistical performance measure
2nd

Steel Belted RADIUS, installing and configuring
2nd3rd

structural health monitoring–smart structures


supervision


Supervision


switches or controllers
2nd

symmetric cryptography


Symmetric cryptography

T



Tag


tag data


Tag data


tag data, manipulating


tag/label


tailoring security


target profiling


Target profiling


Threat and target identification
  attack objectives
    backend
    middleware
    radio frequency manipulation
    tag data, manipulating
  blended attacks

threat management


topologies


traditional fixed gain antennas


Traditional wireless networks (TWNs), security in
  2.5 generation
    code security
    WAP
  3G
    anonymity, in UMTS
    authentication, in UMTS
    confidentiality, in UMTS
    establishment, in UMTS
    integrity protection, in UMTS
    network domain security
    UMTS security process
  first generation
  second generation
    anonymity, in GSM
    authentication, in GSM
    confidentiality, in GSM
    establishment, in GSM
    vulnerability in, GSM security

transmit power control
2nd

Transmit power control


transmitted power density


Transmitted power density


Transponders


types of

U



ultra wideband


Ultra Wideband (UWB)


UMTS
  anonymity in
  authentication in
  confidentiality in
  establishment in
  integrity protection in
  network domain security
  security process

UMTS security process


under hood


unique SSID, setting
2nd3rd4th5th6th7th8th

Universal Serial Bus (USB)


Unix “Crack”,
2nd

USA Patriot Act (2001)
2nd

user experience, improving
2nd3rd

uses
2nd

using EAP-TLS on Microsoft network
2nd

V



Virtual Private Network (VPN)


Voice communications
  intercepting
  obtaining

voice communications, intercepting


voice-mail, obtaining


Voice-mail, obtaining


vulnerability in


vulnerability in, GSM security

W



WAP


War-chalking


War-driving


War-flying


War-walking


Web-based e-mail


WEP decryption tools
2nd3rd

WEP, enabling
2nd3rd4th5th6th7th8th

Wi-Fi
2nd

Wi-Fi Protected Access (WPA)
  authentication
  confidentiality
  establishment
  implementation
    D-Link DI-624 AirPlus 2.4 GHz Xtreme G wireless router with 4-port switch, configuring
    Linksys WRV54G VPN broadband router, configuring
    Windows XP Wireless clients, configuring
  integrity
  management

Windows 2000 clients, configuring
2nd3rd

Windows 2000/XP computers preparation, for use with WRV54G
2nd3rd

Windows Active Directory domain authentication, with LEAP and RADIUS
2nd3rd

Windows NT L0phtCrack


Windows NT L0phtCrack (LC4)


Windows XP clients, configuring
2nd

Windows XP wireless clients, configuring


Windows XP wireless Clients, configuring


Windows XP Wireless clients, configuring


WinSniffer
2nd3rd

Wired Equivalent Privacy (WEP)
  decryption tools
  drawbacks

wired network topologies


wired networks
2nd

Wired networks
  MAC in
  physical layer technologies
  topologies

Wireless ad hoc networks, security in
  Bluetooth
    authentication
    basics
    confidentiality
    enhancements
    establishment
    integrity protection
    security modes

Wireless Application Protocol (WAP)


wireless bridges
2nd

Wireless bridges


wireless cards
2nd

Wireless cards


Wireless clients, security features on
  Linux clients, configuring
  Windows 2000 clients, configuring
  Windows XP clients, configuring

Wireless embedded system security
  Bluetooth
  wireless technologies
    and future
    cellular technologies
    drowning, in acronyms
    Wi-Fi
    WPA authentication
    WPA key management
  ZigBee

Wireless fidelity (Wi-Fi)
  requirements of

Wireless fundamentals
  wireless medium
    bandwidth
    constraints
    exposed terminal problem
    hidden terminal problem
    radio propagation effects
  wireless networking basics
    WLANs

Wireless gateway with Reef Edge Dolphin, implementing
  Dolphin review
  Dolphin, configuring
  Dolphin, installing
  user experience, improving

Wireless Local Area Networks (WLANs)
  access points
  advantages of
  antennas
    smart antennas
    traditional fixed gain antennas
  arrays
  attacks
  audit and discovery tools
    AiroPeek NX
    Kismet
    MiniStumbler
    NetStumbler
    Sniffer Wireless
  bluetooth and WPANs
  current standards
  disadvantages of
  future standards
  hardware
    wireless network bridging
    wireless printer servers
  implementation concerns
    capacity
    performance
    planning
    power consumption
    power over Ethernet
  LANs
  lightweight access point protocol
  network access to
    authentication weaknesses, exploiting
    confidentiality weaknesses, exploiting
    cryptographic weaknesses, exploiting
    data integrity weaknesses, exploiting
    MAC address spoofing and circumventing filters
    rogue AP exploitation
    WEP decryption tools
    WLAN attacks
  performance
  security
    anonymity in
    authentication in
    confidentiality in
    data integrity in
    establishment protocol of
    loopholes in security
    WPA
    WPA2 (802.11i)
  switches or controllers
  ultra wideband
  wireless network interface cards
  working of

Wireless MAN devices
  fixed wireless MAN antennas
  fixed wireless MAN devices
  mobile wireless MAN devices

wireless media access
2nd

Wireless media access


Wireless medium
  bandwidth
  constraints
  exposed terminal problem
  hidden terminal problem
  radio propagation effects

wireless network bridging


Wireless network bridging


wireless network interface cards
2nd

Wireless network interface cards


Wireless network logical architecture
  data link layer technologies
    logical link control
    MAC
  network layer technologies
    address resolution protocol
    Internet Protocol Version
    IP addressing
    network address translation
    port address translation
    private IP addresses
    routing
  operating system considerations
  OSI network model
  physical layer technologies
    wired networks
    wireless networks

Wireless network physical architecture
  wired network topologies
  wireless MAN devices
    fixed wireless MAN antennas
    fixed wireless MAN devices
    mobile wireless MAN devices
  wireless network topologies
    mesh networks
    point-to-point connections
    star topologies, in wireless networks
  wireless PAN devices
    hardware devices
    wireless PAN antennas
  WLAN devices
    access points
    antennas
    arrays
    hardware
    lightweight access point protocol
    switches or controllers
    wireless network interface cards

wireless network, configuring
2nd

wireless networks
2nd

Wireless networks
  802.11a protocol
  802.11b protocol
  802.11g protocol
  configuring
  encryption in
  MAC in
  next-generation protocols
  physical layer technologies
  restrict access to
  security measures
    antivirus software installation
    encryption, in wireless network
    home wireless network, securing
    logs, reviewing
    personal firewall installation
    public wireless networks
    restrict access, to wireless network
    SSID, changing
    wireless network, configuring
  topologies in
    mesh networks
    point-to-point connections
    star topologies
  WLANs

wireless PAN antennas


Wireless Personal Area Networks (WPANs)
  antennas
  hardware devices
    Bluetooth devices
    ZigBee devices

Wireless policy essentials


Wireless position statement


wireless printer servers


Wireless printer servers


wireless protocol analyzers
2nd

Wireless protocol analyzers


Wireless security implementation
  D-Link DI-624 AirPlus 2.4 GHz Xtreme G wireless router with 4-port switch, enabling security features on
    MAC address, filtering by
    SSID broadcast, disabling
    unique SSID, setting
    WEP, enabling
  fast track solutions
  Linksys BEFW11 SR 802.11b access point/router, enabling security features on
    MAC address, filtering by
    SSID broadcast, disabling
    unique SSID, setting
    WEP, enabling
  Linksys WAP11 802.11b access point, enabling security features on
    MAC address, filtering by
    SSID broadcast, disabling
    unique SSID, setting
    WEP, enabling
  Linksys WRT54G 802.1 lb/g access point/router, enabling security features on
    MAC address, filtering by
    SSID broadcast, disabling
    unique SSID, setting
    WEP, enabling
  wireless clients, configuring security features on
    Linux clients, configuring
    Windows 2000 clients, configuring
    Windows XP clients, configuring

Wireless sensor networks
  an introduction
  applications of
    civil structure monitoring
    industrial automation
    structural health monitoring–smart structures
  architecture of
    hybrid star and mesh network
    mesh network
    star network
  future developments
  power consideration in
  radio options for physical layer
    Bluetooth
    IEEE 1451.5 standard
    IEEE 802.11 standard
    IEEE 802.15.4 standard
    ZigBee
  wireless sensor node architecture

wireless sensor node architecture


Wireless technologies
  and future
  cellular technologies
  drowning, in acronyms
  Wi-Fi
  WPA
    authentication
    management

Wiretapping


wiretapping procedures, changes to


WLAN attacks
2nd3rd

WLAN audit and discovery tools


WLANs
2nd

working of


WPA


WPA authentication


WPA key management


WPA2 (802.11i)

  authentication
  confidentiality
  establishment
  integrity

Wrap-Up
2nd

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.14.70.203