Wireless Security Architecture

Book description

Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutions

Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security.

Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage—including data published for the first time—of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes:

  • Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies
  • Effective technical resources and real-world sample architectures
  • Explorations of the relationships between security, wireless, and network elements
  • Practical planning templates, guides, and real-world case studies demonstrating application of the included concepts

Perfect for network, wireless, and enterprise security architects, Wireless Security Architecture belongs in the libraries of technical leaders in firms of all sizes and in any industry seeking to build a secure wireless network.

Table of contents

  1. Cover
  2. Title Page
  3. Foreword
  4. Preface
    1. Who This Book Is For
    2. Distinctive Features
  5. Introduction
    1. Overview of the Book and Technology
    2. How This Book Is Organized
    3. Why Read This Book
    4. What's on the Website
    5. Congratulations
  6. Part I: Technical Foundations
    1. CHAPTER 1: Introduction to Concepts and Relationships
      1. Roles and Responsibilities
      2. Security Concepts for Wireless Architecture
      3. Wireless Concepts for Secure Wireless Architecture
      4. Summary
    2. CHAPTER 2: Understanding Technical Elements
      1. Understanding Wireless Infrastructure and Operations
      2. Understanding Data Paths
      3. Understanding Security Profiles for SSIDs
      4. Summary
    3. CHAPTER 3: Understanding Authentication and Authorization
      1. The IEEE 802.1X Standard
      2. RADIUS Servers, RADIUS Attributes, and VSAs
      3. Change of Authorization and Disconnect Messages
      4. EAP Methods for Authentication
      5. MAC-Based Authentications
      6. Certificates for Authentication and Captive Portals
      7. Captive Portal Security
      8. LDAP Authentication for Wi-Fi
      9. The 4-Way Handshake in Wi-Fi
      10. Summary
    4. CHAPTER 4: Understanding Domain and Wi-Fi Design Impacts
      1. Understanding Network Services for Wi-Fi
      2. Understanding Wi-Fi Design Impacts on Security
      3. Summary
  7. Part II: Putting It All Together
    1. CHAPTER 5: Planning and Design for Secure Wireless
      1. Planning and Design Methodology
      2. Planning and Design Inputs (Define and Characterize)
      3. Planning and Design Outputs (Design, Optimize, and Validate)
      4. Correlating Inputs to Outputs
      5. Planning Processes and Templates
      6. Notes for Technical and Executive Leadership
      7. Summary
    2. CHAPTER 6: Hardening the Wireless Infrastructure
      1. Securing Management Access
      2. Designing for Integrity of the Infrastructure
      3. Controlling Peer-to-Peer and Bridged Communications
      4. Best Practices for Tiered Hardening
      5. Additional Security Configurations
      6. Summary
  8. Part III: Ongoing Maintenance and Beyond
    1. CHAPTER 7: Monitoring and Maintenance of Wireless Networks
      1. Security Testing and Assessments of Wireless Networks
      2. Security Monitoring and Tools for Wireless
      3. Logging, Alerting, and Reporting Best Practices
      4. Troubleshooting Wi-Fi Security
      5. Training and Other Resources
      6. Summary
    2. CHAPTER 8: Emergent Trends and Non-Wi-Fi Wireless
      1. Emergent Trends Impacting Wireless
      2. Enterprise IoT Technologies and Non-802.11 Wireless
      3. Final Thoughts from the Book
  9. Appendix A: Notes on Configuring 802.1X with Microsoft NPS
    1. Wi-Fi Infrastructure That Supports Enterprise (802.1X) SSID Security Profiles
    2. Endpoints That Support 802.1X/EAP
    3. A Way to Configure the Endpoints for the Specified Connectivity
    4. An Authentication Server That Supports RADIUS
  10. Appendix B: Additional Resources
    1. IETF RFCs
    2. IEEE Standards and Documents
    3. Wi-Fi Alliance
    4. Blog, Consulting, and Book Materials
    5. Compliance and Mappings
    6. Cyber Insurance and Network Security
  11. Appendix C: Sample Architectures
    1. Architectures for Internal Access Networks
    2. Architectures for Guest/Internet-only Networks
    3. Determining Length of a WPA3-Personal Passphrase
  12. Appendix D: Parting Thoughts and Call to Action
    1. The Future of Cellular and Wi-Fi
    2. MAC Randomization
    3. Security, Industry, and The Great Compromise
  13. Index
  14. Copyright
  15. Dedication
  16. About the Author
  17. About the Technical Editor
  18. Acknowledgments
  19. End User License Agreement

Product information

  • Title: Wireless Security Architecture
  • Author(s): Jennifer Minella, Stephen Orr
  • Release date: April 2022
  • Publisher(s): Wiley
  • ISBN: 9781119883050