Wireless Information Warfare
Randall K. Nichols, The George Washington University & University of Maryland University College
Definition of Wireless Information Warfare
Taxonomies of Information Warfare
Classification by Domain of Information Aggression
Classification by Confidentiality, Integrity, and Availability
Relationship to Asymmetric Warfare
Classification by Exploitation and Attack/Defense
Taxonomies of Wireless Networks
Network Architecture Classifications
Unique Aspects of Wireless Information Warfare
Why Is Wireless Security Different?
Performance Measures and Key Design Trade-Offs
Military-Unique System Requirements
Secure Communications System Design
Offensive Information Operations
Defensive Information Operations
WIW in Practice: Vulnerabilities of a Suburban Hospital
Security Measures for the Hospital
Example Attack: Remote Attack on a Wireless Network (VLAN Hopping)
Attack via Public Access Pathways
Example Defense: Methods of Defense
Host-Based Intrusion Detection System (h-IDS)
Defenses for Wireless Networks
Defense against Information Pilfering
Defense against Malicious Code Introduction
Defense from Attack via Trusted Agents
Defense against Remote Doctor Offices
Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.