Chapter 14

Wireless Attacks, Intrusion Monitoring, and Policy

In this chapter, you will learn about the following:

Wireless attacks

Rogue wireless devices

Peer-to-peer attacks

Eavesdropping

Encryption cracking

Authentication attacks

MAC spoofing

Management interface exploits

Wireless hijacking

Denial of service (DoS)

Vendor-specific attacks

Social engineering

Intrusion monitoring

Wireless intrusion detection system (WIDS)

Wireless intrusion prevention system (WIPS)

Mobile WIDS

Spectrum analyzer

Wireless security policy

General security policy

Functional security policy

Legislative compliance

PCI compliance

802.11 wireless policy recommendations

In Chapter 13, “802.11 Network Security Architecture,” we discussed legacy 802.11 security solutions ...

Get CWNA: Certified Wireless Network Administrator Official Study Guide: Exam PW0-105, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.