Chapter 14

Wireless Attacks, Intrusion Monitoring, and Policy

In this chapter, you will learn about the following:

Wireless attacks

Rogue wireless devices

Peer-to-peer attacks


Encryption cracking

Authentication attacks

MAC spoofing

Management interface exploits

Wireless hijacking

Denial of service (DoS)

Vendor-specific attacks

Social engineering

Intrusion monitoring

Wireless intrusion detection system (WIDS)

Wireless intrusion prevention system (WIPS)

Mobile WIDS

Spectrum analyzer

Wireless security policy

General security policy

Functional security policy

Legislative compliance

PCI compliance

802.11 wireless policy recommendations

In Chapter 13, “802.11 Network Security Architecture,” we discussed legacy 802.11 security solutions ...

Get CWNA: Certified Wireless Network Administrator Official Study Guide: Exam PW0-105, 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.