O'Reilly logo

Wireless Security: Know It All by Jon S. Wilson, Chris Lanthem, Frank Thornton, George L Stefanek, Timothy Stapko, James F. Ransome PhD, CISM, CISSP, John Rittinghouse PhD, CISM, Stephen A. Rackley, Chris Hurley, Tony Bradley, Dan Bensky, Praphul Chandra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15. Intrusion Process

The scope of this chapter is to understand the technical capabilities and limitations of a potential unauthorized intruder in order to make sure that your own security measures can withstand a hacker’s attempt to breach them. It is important to know not only your own tools and techniques, but also those of the potential adversary, in order to better protect against them. This is the first part of an age-old strategy used by the famous Chinese strategist, Sun Tzu, who said, “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required