Wireless Information Warfare

Randall K. Nichols, The George Washington University & University of Maryland University College

Introduction

Definition of Wireless Information Warfare

Taxonomies of Information Warfare

Classification by Domain of Information Aggression

Classification by Confidentiality, Integrity, and Availability

Relationship to Asymmetric Warfare

Classification by Exploitation and Attack/Defense

Taxonomies of Wireless Networks

Network Architecture Classifications

Mobility Classifications

Unique Aspects of Wireless Information Warfare

Why Is Wireless Security Different?

Performance Measures and Key Design Trade-Offs

Military-Unique System Requirements

Secure Communications System Design

Offensive Information Operations

Taxonomy of Attack Operations

Cryptographic Attacks

Defensive Information Operations

WIW in Practice: Vulnerabilities of a Suburban Hospital

Security Measures for the Hospital

Target Wireless Operations

VLAN Operations and Servers

The Wireless Attacks

Example Attack: Remote Attack on a Wireless Network (VLAN Hopping)

Attack via Trusted Agents

Attack via Public Access Pathways

Example Defense: Methods of Defense

Host-Based Intrusion Detection System (h-IDS)

Firewall

Defenses for Wireless Networks

Defense against Information Pilfering

Defense against Malicious Code Introduction

Attacker Identification

Defense from Attack via Trusted Agents

Defense against Remote Doctor Offices

Defenses against Attacks via Public Access Pathways

Incident Response

Defense ...

Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.