Chapter 8

Wireless Technologies, Mobile Security, and Attacks

This chapter covers the following topics:

  • Wireless Technologies: Wireless devices are extremely popular. From traditional LANs to Bluetooth, NFC, and other RF-based technologies, these technologies are crucial for today’s environment and must be deployed securely.

  • Mobile Security: Mobile security is an increasingly important part of security. More people bank online on mobile devices than on home computers. Mobile phones are all around us, and so is the potential for attack.

  • Wireless LANs: This technology is popular at home and at businesses and offers attackers an easy way to target a network. Securing this technology is of critical importance.

This chapter introduces you to ...

Get CEH Certified Ethical Hacker Cert Guide, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.