W
IRELESS
N
ETWORK
S
ECURITY
ii
Table of Contents
Executive Summary................................................................................................................. 1
1. Introduction................................................................................................................... 1-1
1.1 Authority ................................................................................................................ 1-1
1.2 Document Purpose and Scope.............................................................................. 1-1
1.3 Audience and Assumptions ................................................................................... 1-2
1.4 Document Organization ......................................................................................... 1-2
2. Overview of Wireless Technology................................................................................ 2-1
2.1 Wireless Networks................................................................................................. 2-1
2.1.1 Wireless LANs ........................................................................................... 2-1
2.1.2 Ad Hoc Networks ....................................................................................... 2-1
2.2 Wireless Devices................................................................................................... 2-2
2.2.1 Personal Digital Assistants......................................................................... 2-2
2.2.2 Smart Phones ............................................................................................ 2-3
2.3 Wireless Standards................................................................................................ 2-3
2.3.1 IEEE 802.11............................................................................................... 2-3
2.3.2 Bluetooth.................................................................................................... 2-3
2.4 Wireless Security Threats and Risk Mitigation ....................................................... 2-4
2.5 Emerging Wireless Technologies........................................................................... 2-6
2.6 Federal Information Processing Standards............................................................ 2-6
3. Wireless LANs............................................................................................................... 3-8
3.1 Wireless LAN Overview......................................................................................... 3-8
3.1.1 Brief History ............................................................................................... 3-8
3.1.2 Frequency and Data Rates ........................................................................ 3-9
3.1.3 802.11 Architecture.................................................................................... 3-9
3.1.4 Wireless LAN Components ...................................................................... 3-11
3.1.5 Range ...................................................................................................... 3-11
3.2 Benefits ................................................................................................................3-12
3.3 Security of 802.11 Wireless LANs.........................................................................3-13
3.3.1 Security Features of 802.11 Wireless LANs per the Standard.................. 3-13
3.3.2 Problems With the IEEE 802.11 Standard Security.................................. 3-17
3.4 Security Requirements and Threats......................................................................3-19
3.4.1 Loss of Confidentiality.............................................................................. 3-20
3.4.2 Loss of Integrity........................................................................................ 3-21
3.4.3 Loss of Network Availability...................................................................... 3-22
3.4.4 Other Security Risks ................................................................................ 3-22
3.5 Risk Mitigation ......................................................................................................3-22
3.5.1 Management Countermeasures............................................................... 3-23
3.5.2 Operational Countermeasures ................................................................. 3-23
3.5.3 Technical Countermeasures .................................................................... 3-24
3.6 Emerging Security Standards and Technologies ..................................................3-36
3.7 Case Study: Implementing a Wireless LAN in the Work Environment..................3-37
3.8 Wireless LAN Security Checklist...........................................................................3-40
3.9 Wireless LAN Risk and Security Summary ...........................................................3-42
4. Wireless Personal Area Networks................................................................................ 4-1
评论0
最新资源