You are previewing Take Control of Your Wi-Fi Security.
O'Reilly logo
Take Control of Your Wi-Fi Security

Book Description

Do you know who's using your wireless network right now? Whether you are concerned about a home or small office network, wireless networking experts Glenn Fleishman and Adam Engst help you evaluate your security risks, understand the pros and cons of different techniques, and secure your wireless network and data.

Table of Contents

  1. Take Control of Your Wi-Fi Security
    1. Read Me First
      1. Updates and More
      2. Basics
      3. What’s New in Version 1.7
      4. What Was New in Version 1.6
    2. Introduction
    3. 1. Wi-Fi Security Quick Start
    4. 2. Determine Your Security Risk
      1. Evaluate the Likelihood of Attack
        1. Consider your location
        2. Determine the desirability of your data
      2. Determine Your Liability
        1. Access liability
        2. Network traffic liability
        3. Computer intrusion liability
      3. Calculate Lost Opportunity
      4. What You Should Do
    5. 3. Prevent Access to Your Wireless Network
      1. Use Secure Settings
      2. Ignore These Sops to Security
        1. Don’t bother closing your network
        2. Ignore MAC address access controls
      3. Watch out for WEP Encryption
        1. Ease of use
        2. Effective key security
      4. Use Wi-Fi Protected Access (WPA or WPA2)
        1. Background and history
        2. WPA2 fixes
        3. Turn on WPA2
          1. Configure an Apple base station
          2. Configure most Linksys routers
          3. Configure other routers
        4. Connect with WPA2
        5. Simplify with Wi-Fi Protected Setup
          1. Advertise availability
          2. Client initiates
          3. Client requests a base station PIN
          4. One last reminder
      5. Enable Guest Access
        1. Use Apple’s guest networking
        2. Share via Easy WiFi
    6. 4. Secure Your Data in Transit
      1. Encrypt Email Passwords
        1. POP3 with APOP
        2. IMAP with CRAM-MD5
        3. SMTP AUTH
      2. Encrypt Specific Files and Messages
        1. Understand public-key cryptography
          1. How PGP works
          2. Distributing keys
      3. Encrypt Sessions and Data Sequences with SSL/TLS
        1. Understand how SSL/TLS works
        2. Use SSL/TLS where possible
          1. Secured Web sites
          2. Secure email connections
          3. Secure FTP
      4. Encrypt Data Streams with SSH
        1. Understand how SSH works
        2. Secure all Web connections with a proxy
      5. Encrypt All Data with a VPN
    7. 5. Protect Your Systems
      1. Get Paranoid
      2. Install Antivirus Software
      3. Assign Private Addresses for Passive Protection
      4. Enable an Active Firewall
        1. Enable the firewall in Mac OS X 10.3 and 10.4
        2. Enable the firewall in Mac OS X 10.5 and 10.6
        3. Enable the Windows XP firewall
        4. Enable the Windows Vista firewall
        5. Enable the Windows 7 firewall
    8. 6. Secure Small Office Wi-Fi
      1. Three Security Options
      2. Use a Shared Key
      3. Use WPA2 Enterprise Logins
        1. Understand 802.1X
        2. Add WPA2 Enterprise to your network
      4. Use a VPN
        1. Choose a software VPN server
        2. Choose VPN hardware
        3. Choose a VPN service
    9. Glossary
    10. A. Password Advice
      1. Generate Three Passwords
      2. Learn to Create a Highly Secure Password
    11. B. About This Book
      1. Ebook Extras
      2. About Glenn
      3. About Adam
      4. Authors’ Acknowledgments
      5. Shameless Plugs
      6. About the publisher
      7. Production Credits