Chapter 14Wireless Attacks, Intrusion Monitoring, and Policy

In this chapter, you will learn about the following:

  1. imageWireless attacks
    • Rogue wireless devices
    • Peer-to-peer attacks
    • Eavesdropping
    • Encryption cracking
    • Authentication attacks
    • MAC spoofing
    • Management interface exploits
    • Wireless hijacking
    • Denial of service (DoS)
    • Vendor-specific attacks
    • Social engineering
  2. imageIntrusion monitoring
    • Wireless intrusion detection system (WIDS)
    • Wireless intrusion prevention system (WIPS)
    • Mobile WIDS
    • Spectrum analyzer
  3. Wireless security policy
    • General security ...

Get CWNA: Certified Wireless Network Administrator Official Study Guide: Exam CWNA-106 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.