Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

Client and Infrastructure Exploits

Cybercriminals tend to seek out weak points that they discover in a network infrastructure or in a device’s hardware or OS. The weak points in a wireless network relate to the association and authentication of devices. In a wired network, much of this can be taken for granted, because a physical connection is required via a cable and switch. With a wireless network, this is not the case. Any device listening on the same 2.4 GHz or 5 GHz band can listen and perhaps negotiate an association and join the network.

In the early days of 802.11, wireless networks were easy to penetrate because encryption was weak and people didn’t understand best practices. Today, IT departments have good standards and better tools ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733