
Wireless Security and Privacy
Best Practices and Design Techniques
Tara M. Swaminatha, Charles R. Elden
Résumé
As wireless technology emerges into the mainstream of
the networking and communications markets, the wireless
development community has a unique opportunity to be
proactive, rather than reactive, in its approach to
security. At this early point in the wireless industry,
developers can anticipate future security needs and
integrate security considerations into every stage of the
development process. Wireless Security and Privacy shows
developers how to take advantage of this exceptional
opportunity.
Written for wireless development professionals new to
security, as well as security professionals moving into the
wireless arena, this book presents the foundation upon
which to design and develop secure wireless systems. It
looks in depth at the key issues faced by those who develop
wireless devices and applications, describes the technology
and tools that are now available, and offers a proven
methodology for designing a comprehensive wireless risk
management solution.
In particular, Wireless Security and Privacy documents the
I-ADD process, which offers a standardized, systematic
approach for identifying targets, analyzing
vulnerabilities, defining strategies, and designing
security into the entire development lifecycle of a
wireless system.
The book also examines such important topics as:
- Fundamental wireless and security principles
- Specific wireless technologies, including 802.11b, Bluetooth, and WAP
- The security implications of the architecture of PDAs, cell phones, and wireless network cards for laptops
- The security shortcomings of wireless development languages
- Development of a riskmodel for a wireless system
- Cryptography essentials
- The role of COTS products in a comprehensive security solution
- Privacy policy and legal issues
- Analysis of known and theoretical attacks
- Security, financial, and functionality tradeoffs
- Several case studies run throughout the book, illustrating the application of important concepts, techniques, strategies, and models.
Contents
I. INTRODUCTORY TOPICS
- 1. Wireless Technologies
- 2. Security Principles
II. KNOW YOUR SYSTEM
- 3. Technologies
- 4. Devices
- 5. Languages
III. PROTECT YOUR SYSTEM
- 6. Cryptography
- 7. COTS
- 8. Privacy
IV. I-ADD
- 9. Identify
- 10. Analyze (Attacks & Vulnerabilities)
- 11. Analyze (Mitigations & Protections)
- 12. Define & Design
- Future Research
L'auteur - Tara M. Swaminatha
Tara M. Swaminatha is an information security administrator for the International Finance Corporation, a part of the World Bank Group. Tara is responsible for educating the IFC about information security, conducting technical product evaluations, offering security classes to employees, and assisting with the definition and implementation of plans for security best practices and technologies. Previously Tara was a software security consultant with Cigital's Software Security Group (SSG). The SSG provides software security risk analysis for a broad range of clients. Tara also worked for PEC Solutions on a team that developed software and infrastructure for agencies within the U.S. Department of Justice. She implemented configuration control practices, maintained integrity of the development and production environments, and performed software, hardware, and multi-system integration. Tara holds both a B.A. in sociology and an M.T. in special education from the University of Virginia, where she graduated with high distinction. While working at the IFC, Tara is also pursuing her J.D. at Georgetown University.
L'auteur - Charles R. Elden
Charles R. Elden is an independent security consultant.
He worked most recently at Cigital, where he was a manager
and software security consultant with Cigital's Software
Security Group. He has experience performing communication
and software systems risk analysis and risk management.
Previously he worked for the Central Intelligence Agency
for 12 years and has worked for more than 11 years in the
Directorate of Science and Technology's Office of Technical
Services. Charles has extensive experience designing,
developing, deploying, and exploiting secure and covert
computing and communication systems. He received his M.S.
in computer science from George Mason University and his
B.S. in computer science/computer engineering from Michigan
State University.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Addison Wesley |
Auteur(s) | Tara M. Swaminatha, Charles R. Elden |
Parution | 26/09/2002 |
Nb. de pages | 300 |
Format | 18,7 x 23 |
Couverture | Broché |
Poids | 605g |
Intérieur | Noir et Blanc |
EAN13 | 9780201760347 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse