Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

When an Attacker Gains Unauthorized Control

As you have seen with ad hoc networks, it’s possible for an attacker to gain unauthorized access to and control of an 802.11 network simply because device authentication is not robust. You can secure access points from unauthorized authentication and association by using WEP and WPA (for casual “free” access) or the more robust WPA2. WEP and WPA can be cracked with off-the-shelf tools and should never be used if WPA2 is available. However, WPA2 is not the answer for hotel or café hotspots. In these cases, device authentication and association must take place at Layer 1 and Layer 2, and user authentication must follow at the Network or Application Layer, driven by web browser username/password challenges. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733