Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise
- Length: 624 pages
- Edition: 1
- Language: English
- Publisher: Wiley
- Publication Date: 2022-04-12
- ISBN-10: 1119883059
- ISBN-13: 9781119883050
- Sales Rank: #482529 (See Top 100 Books)
Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutions
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security.
Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage―including data published for the first time―of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes:
- Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies
- Effective technical resources and real-world sample architectures
- Explorations of the relationships between security, wireless, and network elements
- Practical planning templates, guides, and real-world case studies demonstrating application of the included concepts
Perfect for network, wireless, and enterprise security architects, Wireless Security Architecture belongs in the libraries of technical leaders in firms of all sizes and in any industry seeking to build a secure wireless network.
Cover Table of Contents Title Page Foreword Preface Who This Book Is For Distinctive Features Introduction Overview of the Book and Technology How This Book Is Organized Why Read This Book What's on the Website Congratulations Part I: Technical Foundations CHAPTER 1: Introduction to Concepts and Relationships Roles and Responsibilities Security Concepts for Wireless Architecture Wireless Concepts for Secure Wireless Architecture Summary CHAPTER 2: Understanding Technical Elements Understanding Wireless Infrastructure and Operations Understanding Data Paths Understanding Security Profiles for SSIDs Summary CHAPTER 3: Understanding Authentication and Authorization The IEEE 802.1X Standard RADIUS Servers, RADIUS Attributes, and VSAs Change of Authorization and Disconnect Messages EAP Methods for Authentication MAC-Based Authentications Certificates for Authentication and Captive Portals Captive Portal Security LDAP Authentication for Wi-Fi The 4-Way Handshake in Wi-Fi Summary CHAPTER 4: Understanding Domain and Wi-Fi Design Impacts Understanding Network Services for Wi-Fi Understanding Wi-Fi Design Impacts on Security Summary Part II: Putting It All Together CHAPTER 5: Planning and Design for Secure Wireless Planning and Design Methodology Planning and Design Inputs (Define and Characterize) Planning and Design Outputs (Design, Optimize, and Validate) Correlating Inputs to Outputs Planning Processes and Templates Notes for Technical and Executive Leadership Summary CHAPTER 6: Hardening the Wireless Infrastructure Securing Management Access Designing for Integrity of the Infrastructure Controlling Peer-to-Peer and Bridged Communications Best Practices for Tiered Hardening Additional Security Configurations Summary Part III: Ongoing Maintenance and Beyond CHAPTER 7: Monitoring and Maintenance of Wireless Networks Security Testing and Assessments of Wireless Networks Security Monitoring and Tools for Wireless Logging, Alerting, and Reporting Best Practices Troubleshooting Wi-Fi Security Training and Other Resources Summary CHAPTER 8: Emergent Trends and Non-Wi-Fi Wireless Emergent Trends Impacting Wireless Enterprise IoT Technologies and Non-802.11 Wireless Final Thoughts from the Book Appendix A: Notes on Configuring 802.1X with Microsoft NPS Wi-Fi Infrastructure That Supports Enterprise (802.1X) SSID Security Profiles Endpoints That Support 802.1X/EAP A Way to Configure the Endpoints for the Specified Connectivity An Authentication Server That Supports RADIUS Appendix B: Additional Resources IETF RFCs IEEE Standards and Documents Wi-Fi Alliance Blog, Consulting, and Book Materials Compliance and Mappings Cyber Insurance and Network Security Appendix C: Sample Architectures Architectures for Internal Access Networks Architectures for Guest/Internet-only Networks Determining Length of a WPA3-Personal Passphrase Appendix D: Parting Thoughts and Call to Action The Future of Cellular and Wi-Fi MAC Randomization Security, Industry, and The Great Compromise Index Copyright Dedication About the Author About the Technical Editor Acknowledgments End User License Agreement
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.