LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 24th, 2014
Linux Security Week: October 20th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Book Review: Securing Wireless LANs Print E-mail
User Rating:      How can I rate this item?
Source: net-security.org - Posted by David Isecke   
Documentation I usually never comment the book's price, but this time I should do it because of a simple reason - I've ordered this book primary because it was listed on Amazon.com with a $55 price tag. After seeing the price, I've told myself that it is probably because the book is either a massive 1000 pages long book or a relatively long hardcover accompanied by a CD. Unfortunately, from the technical characteristics point of view, the book isn't anywhere close to my initial ideas, but is a rather slim, paperback 250 pager. This is really bad for the book, as it is one of the better introductionary wireless security books I've stumbled upon, but the price tag will surely drive away a number of potential buyers. The bottom line is that "Securing Wireless LANs" is a publication that will be of a great use to wireless newcomers and intermediate readers, as it will basically introduce them with all the stuff they should think about while deploying a wireless LAN in a secure manner. . . . A couple of days ago the WI-FI Alliance finally announced that after almost one year of detailed testing, more than 175 products from some of the leading wireless manufacturers, received WPA certifications. The majority of wireless users won't immediately buy the new hardware, so they are stuck with the equipment they are currently using. The current state of wireless security is the topic of the book I'm taking a look at this time.

About the author

Gilbert Held is an internationally known award-winning author and teacher with over 30 years in experience in managing communication networks. Some of his previous books include "Bulletproofing TCP/IP Based Windows NT/2000 Networks", "Quality of Service in a Cisco Networking Environment" and "Ethernet Networks, 4th Edition".

Inside the book

The book starts with some introductionary concepts that are presented to get the readers acquainted with the basics of wireless networking, as well as some initial Wireless Local Area Network standards.

After introducing the readers with some typical basics, Held goes a bit deeper into making them understand the way the data is transported over wireless networks. The author notes that this should ultimately be used for better realizing the threats to WLAN networks and the ways to secure them. After inspecting the different frame formats, Held discusses wireless signals, an important topic for all WLAN deployers.

Altought WEP gets mentioned earlier while taking a look at frame formats, its importance in the current WLAN installations, secured it a whole chapter for discussion about its (in)security. Not like the other authors who immediately diss WEP, the author points out that WEP wasn't meant to be the ultimate security mechanism, but was rather created to provide wired equivalent privacy - which doesn't in any way mean such a strong encryption everyone expected from it. With this on your mind, combined with some tips on optimizing WEP usage, the majority of WLAN networks can provide a relatively secure environment. Over about 35 pages, Held discusses both passive and active WEP weaknesses and the ways to exploit them.

The fifth chapter is the place where the reader can go deeper into the actual security issues that surround wireless users. It was nice to see that besides the "standard" issues, the author covers some situations which I didn't see discussed in other similar books - open shares on client computers and need for personal firewalls while residing inside a WLAN. Although this doesn't seem special, you would be surprised how many WLAN network administrators consider security measures, but don't spare a minute thinking about client security.

Read this full article at net-security.org

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Disaster as CryptoWall encrypts US firm's entire server installation
Now Everyone Wants to Sell You a Magical Anonymity Router. Choose Wisely
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.