Chapter 5: CRPD & Security
In Wireless Network Security: A Beginner’s Guide, author Tyler Wrightson discusses the many attack vectors that target wireless networks and clients, and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included in the book.
Designed specifically for the needs of IT professionals looking to boost their skills in the fast-paced, ever-changing world of computer security, and who need to quickly understand the risks and vulnerabilities associated with deploying and managing a wireless network, this practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. IT pros will learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates for authentication.
Wrightson provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wireless solutions, are also discussed. Templates, checklists, and examples provide the hands-on help needed to get started right away.
Excerpted from Wireless Network Security: A Beginner’s Guide by Tyler Wrightson (McGraw-Hill; 2012) with permission from McGraw-Hill.