Chapter 4. Look, Ma, No Wires!

Not all security engagements are a response to hacks. Sometimes we’re called in during the initial stages of a project. This case study discusses such a situation. A bank was interested in implementing a wireless network, but because of concerns about the lack of security associated with wireless networks, it requested an initial design and implementation review and evaluation of the proposed wireless network.

We were asked to evaluate the existing implementation and recommend measures to improve security that could be taken prior to the launch of the network. This is a good situation, and we are always happy to take part in this early stage (the earlier the better). Often, only so much security can be retrofitted ...

Get Defend I.T.: Security by Example now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.