Chapter 4. Look, Ma, No Wires!

Not all security engagements are a response to hacks. Sometimes we’re called in during the initial stages of a project. This case study discusses such a situation. A bank was interested in implementing a wireless network, but because of concerns about the lack of security associated with wireless networks, it requested an initial design and implementation review and evaluation of the proposed wireless network.

We were asked to evaluate the existing implementation and recommend measures to improve security that could be taken prior to the launch of the network. This is a good situation, and we are always happy to take part in this early stage (the earlier the better). Often, only so much security can be retrofitted ...

Get Defend I.T.: Security by Example now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.