Chapter 14
Wireless Attacks, Intrusion Monitoring, and Policy
In this chapter, you will learn about the following:
Wireless attacks
Rogue wireless devices
Peer-to-peer attacks
Eavesdropping
Encryption cracking
Authentication attacks
MAC spoofing
Management interface exploits
Wireless hijacking
Denial of service (DoS)
Vendor-specific attacks
Social engineering
Intrusion monitoring
Wireless intrusion detection system (WIDS)
Wireless intrusion prevention system (WIPS)
Mobile WIDS
Spectrum analyzer
Wireless security policy
General security policy
Functional security policy
Legislative compliance
PCI compliance
802.11 wireless policy recommendations
In Chapter 13, “802.11 Network Security Architecture,” we discussed legacy 802.11 security solutions ...
Get CWNA: Certified Wireless Network Administrator Official Study Guide: Exam PW0-105, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.