O'Reilly logo

CWNA: Certified Wireless Network Administrator Official Study Guide: Exam PW0-105, 3rd Edition by David A. Westcott, David D. Coleman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14

Wireless Attacks, Intrusion Monitoring, and Policy

In this chapter, you will learn about the following:

Wireless attacks

Rogue wireless devices

Peer-to-peer attacks

Eavesdropping

Encryption cracking

Authentication attacks

MAC spoofing

Management interface exploits

Wireless hijacking

Denial of service (DoS)

Vendor-specific attacks

Social engineering

Intrusion monitoring

Wireless intrusion detection system (WIDS)

Wireless intrusion prevention system (WIPS)

Mobile WIDS

Spectrum analyzer

Wireless security policy

General security policy

Functional security policy

Legislative compliance

PCI compliance

802.11 wireless policy recommendations

In Chapter 13, “802.11 Network Security Architecture,” we discussed legacy 802.11 security solutions ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required