Book description
Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutions
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security.
Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage—including data published for the first time—of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes:
- Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies
- Effective technical resources and real-world sample architectures
- Explorations of the relationships between security, wireless, and network elements
- Practical planning templates, guides, and real-world case studies demonstrating application of the included concepts
Perfect for network, wireless, and enterprise security architects, Wireless Security Architecture belongs in the libraries of technical leaders in firms of all sizes and in any industry seeking to build a secure wireless network.
Table of contents
- Cover
- Title Page
- Foreword
- Preface
- Introduction
-
Part I: Technical Foundations
- CHAPTER 1: Introduction to Concepts and Relationships
- CHAPTER 2: Understanding Technical Elements
-
CHAPTER 3: Understanding Authentication and Authorization
- The IEEE 802.1X Standard
- RADIUS Servers, RADIUS Attributes, and VSAs
- Change of Authorization and Disconnect Messages
- EAP Methods for Authentication
- MAC-Based Authentications
- Certificates for Authentication and Captive Portals
- Captive Portal Security
- LDAP Authentication for Wi-Fi
- The 4-Way Handshake in Wi-Fi
- Summary
- CHAPTER 4: Understanding Domain and Wi-Fi Design Impacts
- Part II: Putting It All Together
- Part III: Ongoing Maintenance and Beyond
- Appendix A: Notes on Configuring 802.1X with Microsoft NPS
- Appendix B: Additional Resources
- Appendix C: Sample Architectures
- Appendix D: Parting Thoughts and Call to Action
- Index
- Copyright
- Dedication
- About the Author
- About the Technical Editor
- Acknowledgments
- End User License Agreement
Product information
- Title: Wireless Security Architecture
- Author(s):
- Release date: April 2022
- Publisher(s): Wiley
- ISBN: 9781119883050
You might also like
book
Wireless and Mobile Device Security, 2nd Edition
Written by an industry expert, Wireless and Mobile Device Security explores the evolution of wired networks …
book
Take Control of Wi-Fi Networking and Security, 2nd Edition
Get more from your Wi-Fi network Version 2.0, updated January 16, 2024 Setting up and securing …
book
Core Software Security
Introducing users to existing software development life cycle (SDLC) models, this book explains their weakness and …
book
Practical Cybersecurity Architecture
Plan and design robust security architectures to secure your organization's technology landscape and the applications you …