Part
one is an introduction to wireless network security.
Chapter one
is supposed to be an opening to wireless networking,
but is basically
a list of common protocols. Wireless threat analysis,
in chapter two,
is an unstructured list of miscellaneous threats. A facile
overview
of blackhat communities, some intrusion tools, and a
discussion of
insider attacks (without mention of any relevance to
wireless
networking) is in chapter three.
Part
two looks at the components of network security. Chapter
four
presents us with random security factors in place of
the promised
network security model. Network intrusion protection
is said, in
chapter five, to consist of firewalls and other tools
with limited
application to wireless topologies. In regard to network
intrusion
detection, some of the material in chapter six is pointless
(who would
expect an intrusion detection system (IDS) to protect
against insider
attacks?) and some is wrong (a honeypot would only act
as an intrusion
detection sensor by chance). Chapter seven has sound
information on
host-based IDS and some advice on hardening systems,
but wireless
networking is almost unmentioned. Virtual private networks
are
discussed in chapter eight, while nine turns to logging
and audits.
Part
three reviews wireless security components. Chapter
ten outlines
a configuration for basic level wireless security. Secure
authentication, in chapter eleven, has at least some
relation to
wireless. The examination of encryption, in chapter twelve,
lists
protocols without much discussion of concepts, and records
weaknesses
of the systems without providing details. Chapter thirteen
briefly
considers the placement of wireless access points, from
a convenience
rather than security perspective.
Part
four contemplates the integration of wireless security
into the
network security process. Chapter fourteen registers
some tools for
the logging of wireless security events. A number of
points to
consider for a wireless security policy are enumerated
in chapter
fifteen. Various sniffing and cracking tools are described
in chapter
sixteen. Chapter seventeen isn't really clear as to its
purpose, but
seems to be talking about management of device configuration.
Part
five lists products, rather than the promised security
models.
We look at Cisco and LEAP, RADIUS, IPSec, secure wireless
public
access, and secure wireless point-to-point in chapters
eighteen to
twenty two.
While not
as bad as "Wireless Security" (cf.
BKWRLSSC.RVW), by Randall
K. Nichols and Panos C. Lekkas, this work is only on
a par with
bloated exercises such as Jahanzeb Khan and Anis Khwaja's "Building
Secure Wireless Networks with 802.11" (cf. BKBSWNW8.RVW)
or the
comprehensive list of topics (but missing details) in "Designing
a
Wireless Network" (cf. BKDSWLNT.RVW) by Jeffrey
Wheat et al.
Certainly "Wireless Security Essentials" by
Russell Dean Vines (cf.
BKWLSCES.RVW) is far superior to the Carter and Shumway
book.
copyright Robert M. Slade, 2003 BKWLSCEE.RVW 20031019
|