Skip to Main Content
Wireless Security Architecture
book

Wireless Security Architecture

by Jennifer Minella, Stephen Orr
April 2022
Intermediate to advanced content levelIntermediate to advanced
624 pages
17h 17m
English
Wiley
Content preview from Wireless Security Architecture

CHAPTER 2Understanding Technical Elements

Now that we've covered the foundational concepts of security and wireless domains, we'll take a deeper dive into the specific elements, starting with a more technical explanation of wireless infrastructure and management architecture, their impact on data paths, and how that impacts security architecture.

After that, we get into the more technical nuances of wireless security profiles including WPA2 and WPA3, followed by an intimate look into authentication and authorization schema in Chapter 4. Chapter 5 includes considerations for network domain services for wireless as well as a section on non-security Wi-Fi design elements that impact our security architecture, such as roaming protocols and designs for resiliency.

Understanding Wireless Infrastructure and Operations

The first topics to explore are the options for wireless infrastructure and management, and specifically what that means in terms of the data and control planes. Later in the chapter we'll also look more deeply at the data paths specifically for client traffic, and how that impacts security. For now, you'll just get an architecture overview and general teaser for the data path conversation to come.

The history of wireless architectures has been quite cyclic—just like client applications have moved from mainframes to distributed computing, back to centralized light virtual desktop infrastructure (VDI) technologies—so, too, has wireless followed the cycle of heavy→light→heavy, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Core Software Security

Core Software Security

James Ransome, Anmol Misra

Publisher Resources

ISBN: 9781119883050Purchase Link