images

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • Wireless attacks
    • Rogue wireless devices
    • Peer-to-peer attacks
    • Eavesdropping
    • Encryption cracking
    • Authentication attacks
    • MAC spoofing
    • Management interface exploits
    • Wireless hijacking
    • Denial of service (DoS)
    • Vendor-specific attacks
    • Social engineering
  • Intrusion monitoring
    • Wireless intrusion detection system (WIDS)
    • Wireless intrusion prevention system (WIPS)
    • Mobile WIDS
    • Spectrum analyzer
  • Wireless security policy
    • General security policy
    • Functional security policy
    • Legislative compliance
    • PCI compliance
    • 802.11 wireless policy recommendations

In Chapter 13, “802.11 Network Security Architecture,” ...

Get CWNA Certified Wireless Network Administrator Official Deluxe Study Guide: Exam CWNA-106 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.