Preface |
|
xvii | |
Acknowledgments |
|
xix | |
About the Author |
|
xxi | |
Part I Introduction to Wireless and Mobile Networks |
|
1 | (90) |
|
Chapter 1 The Evolution of Data and Wireless Networks |
|
|
3 | (24) |
|
The Dawn of Data Communication |
|
|
4 | (4) |
|
|
5 | (2) |
|
|
7 | (1) |
|
Advances in Personal Computers |
|
|
7 | (1) |
|
Networking and the Open Systems Interconnection Reference Model |
|
|
8 | (6) |
|
The Seven Layers of the OSI Reference Model |
|
|
9 | (2) |
|
Communicating over a Network |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (2) |
|
Business Challenges Addressed by Wireless Networking |
|
|
16 | (3) |
|
The Economic Impact of Wireless Networking |
|
|
16 | (1) |
|
Wireless Networking and the Way People Work |
|
|
16 | (3) |
|
|
19 | (3) |
|
|
20 | (2) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (3) |
|
Chapter 2 The Mobile Revolution |
|
|
27 | (18) |
|
Introduction to Cellular (Mobile Communication) |
|
|
28 | (5) |
|
|
28 | (4) |
|
|
32 | (1) |
|
The Evolution of Mobile Networks |
|
|
33 | (4) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
The BlackBerry Effect and the BYOD Revolution |
|
|
37 | (1) |
|
The Economic Impact of Mobile IP |
|
|
38 | (2) |
|
The Business Impact of Mobility |
|
|
40 | (2) |
|
|
40 | (2) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (2) |
|
Chapter 3 Anywhere, Anytime, on Anything: "There's an App for That!" |
|
|
45 | (20) |
|
Anywhere, Anytime, on Anything |
|
|
46 | (2) |
|
Convenience Trumps Security |
|
|
47 | (1) |
|
Always Connected, Always On |
|
|
47 | (1) |
|
The Rise of the Mobile Workforce |
|
|
48 | (2) |
|
From Castle-and-Moat toward Zero Trust |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
Cloud Apps versus Native Mobile Apps |
|
|
51 | (1) |
|
Deploying Wireless: Different Strokes for Different Folks |
|
|
51 | (1) |
|
The Industrial Internet of Things |
|
|
52 | (2) |
|
IoT Wireless Technologies |
|
|
53 | (1) |
|
Wireless Communication Technologies |
|
|
54 | (2) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
Cloud VPNS, WANs, and Interconnects |
|
|
56 | (2) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
Wireless Network Security |
|
|
60 | (2) |
|
Lingering Security Issues |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (2) |
|
Chapter 4 Security Threats Overview: Wired, Wireless, and Mobile |
|
|
65 | (26) |
|
|
66 | (1) |
|
General Threat Categories |
|
|
67 | (3) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
Threats to Wireless and Mobile Devices |
|
|
70 | (4) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (4) |
|
Mitigating the Risk of BYOD |
|
|
75 | (3) |
|
BYOD for Small-to-Medium Businesses |
|
|
78 | (1) |
|
|
78 | (2) |
|
Authorization and Access Control |
|
|
80 | (2) |
|
|
80 | (2) |
|
Information Security Standards |
|
|
82 | (2) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
84 | (4) |
|
|
84 | (1) |
|
The Gramm-Leach-Bliley Act |
|
|
84 | (1) |
|
The Health Insurance Portability and Accountability Act and the Health Information Technology for Economic and Clinical Health Act |
|
|
85 | (1) |
|
The Payment Card Industry Data Security Standard |
|
|
85 | (1) |
|
|
86 | (1) |
|
Detrimental Effects of Regulations |
|
|
86 | (2) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (2) |
Part II WLAN Security |
|
91 | (148) |
|
Chapter 5 How Do WLANs Work? |
|
|
93 | (32) |
|
|
94 | (1) |
|
|
94 | (4) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (4) |
|
New Wi-Fi Alliance Naming System |
|
|
99 | (3) |
|
|
102 | (3) |
|
Narrowband and Spread Spectrum |
|
|
103 | (1) |
|
|
103 | (1) |
|
Frequency Hopping Spread Spectrum |
|
|
104 | (1) |
|
Direct Sequence Spread Spectrum |
|
|
104 | (1) |
|
|
105 | (4) |
|
|
105 | (3) |
|
|
108 | (1) |
|
|
109 | (2) |
|
Wireless Workgroup Bridges |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (7) |
|
|
112 | (1) |
|
Semi-Directional Antennas |
|
|
112 | (1) |
|
Highly Directional Antennas |
|
|
113 | (1) |
|
|
114 | (4) |
|
Determining Coverage Area |
|
|
118 | (1) |
|
|
118 | (4) |
|
Spectrum and Protocol Analysis |
|
|
120 | (2) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
123 | (2) |
|
Chapter 6 WLAN and IP Networking Threat and Vulnerability Analysis |
|
|
125 | (28) |
|
|
126 | (2) |
|
Skilled versus Unskilled Attackers |
|
|
127 | (1) |
|
Insiders versus Outsiders |
|
|
127 | (1) |
|
Targets of Opportunity versus Specific Targets |
|
|
128 | (1) |
|
Scouting for a Targeted Attack |
|
|
129 | (1) |
|
Physical Security and Wireless Networks |
|
|
130 | (1) |
|
|
131 | (2) |
|
|
133 | (1) |
|
|
134 | (1) |
|
Rogue Access Point Vulnerabilities |
|
|
134 | (1) |
|
|
135 | (2) |
|
Bluetooth Vulnerabilities and Threats |
|
|
137 | (6) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
Wireless Networks and Information Theft |
|
|
144 | (2) |
|
Malicious Data Insertion on Wireless Networks |
|
|
146 | (1) |
|
Denial of Service Attacks |
|
|
147 | (1) |
|
Peer-to-Peer Hacking over Ad Hoc Networks |
|
|
148 | (1) |
|
When an Attacker Gains Unauthorized Control |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (3) |
|
Chapter 7 Basic WLAN Security Measures |
|
|
153 | (22) |
|
Design and Implementation Considerations for Basic Security |
|
|
154 | (4) |
|
|
154 | (1) |
|
Equipment Configuration and Placement |
|
|
155 | (1) |
|
Interoperability and Layering |
|
|
156 | (1) |
|
|
157 | (1) |
|
Basic Security Best Practices |
|
|
158 | (1) |
|
Authentication and Access Restriction |
|
|
158 | (5) |
|
|
159 | (1) |
|
|
160 | (1) |
|
Authentication and Association |
|
|
160 | (1) |
|
|
161 | (1) |
|
Virtual Local Area Networks |
|
|
162 | (1) |
|
|
163 | (6) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
Order of Preference for Wi-Fi Data Protection |
|
|
167 | (1) |
|
|
168 | (1) |
|
Ongoing Management Security Considerations |
|
|
169 | (2) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
Identifying Rogue WLANs/Wireless Access Points |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
172 | (3) |
|
Chapter 8 Advanced WLAN Security Measures |
|
|
175 | (24) |
|
Establishing and Enforcing a Comprehensive Security Policy |
|
|
176 | (3) |
|
Centralized versus Distributed Design and Management |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
Compliance Considerations |
|
|
178 | (1) |
|
Employee Training and Education |
|
|
179 | (1) |
|
Implementing Authentication and Access Control |
|
|
179 | (5) |
|
Extensible Authentication Protocol |
|
|
180 | (1) |
|
Remote Authentication Dial-In User Service |
|
|
180 | (2) |
|
Intrusion Detection Systems and Intrusion Prevention Systems |
|
|
182 | (1) |
|
|
182 | (1) |
|
Authenticated Dynamic Host Configuration Protocol |
|
|
183 | (1) |
|
|
184 | (3) |
|
WPA2 Personal and Enterprise Modes |
|
|
184 | (1) |
|
|
184 | (1) |
|
Internet Protocol Security |
|
|
185 | (1) |
|
|
186 | (1) |
|
Malware and Application Security |
|
|
186 | (1) |
|
|
187 | (2) |
|
Virtual Local Area Networks |
|
|
187 | (1) |
|
Guest Access and Passwords |
|
|
188 | (1) |
|
Demilitarized Zone Segmentation |
|
|
188 | (1) |
|
Managing Network and User Devices |
|
|
189 | (7) |
|
Simple Network Management Protocol Version 3 |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
190 | (1) |
|
Coverage Area and Wi-Fi Roaming |
|
|
191 | (1) |
|
Client Security Outside the Perimeter |
|
|
192 | (1) |
|
Device Management and User Logons |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (2) |
|
Chapter 9 WLAN Auditing Tools |
|
|
199 | (22) |
|
|
200 | (4) |
|
Enterprise Wi-Fi Audit Tools |
|
|
201 | (1) |
|
|
202 | (2) |
|
Penetration Testing Tools |
|
|
204 | (1) |
|
|
204 | (1) |
|
Security Auditor's Research Assistant |
|
|
204 | (1) |
|
Password-Capture and Decryption Tools |
|
|
205 | (3) |
|
|
208 | (1) |
|
Network Management and Control Tools |
|
|
208 | (3) |
|
Wireless Protocol Analyzers |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
Network Management System |
|
|
210 | (1) |
|
WLAN Hardware Audit Tools and Antennas |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
211 | (1) |
|
Attack Tools and Techniques |
|
|
212 | (4) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (2) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (3) |
|
Chapter 10 WLAN and IP Network Risk Assessment |
|
|
221 | (18) |
|
|
222 | (3) |
|
|
224 | (1) |
|
Other Types of Risk Assessment |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
Other Justifications for Risk Assessments |
|
|
226 | (1) |
|
Security Risk Assessment Stages |
|
|
226 | (9) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
229 | (5) |
|
Identifying and Implementing Controls |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
236 | (3) |
Part III Mobile Security |
|
239 | (96) |
|
Chapter 11 Mobile Communication Security Challenges |
|
|
241 | (18) |
|
Mobile Phone Threats and Vulnerabilities |
|
|
242 | (2) |
|
Exploits, Tools, and Techniques |
|
|
244 | (1) |
|
Google Android Security Challenges |
|
|
244 | (7) |
|
|
247 | (1) |
|
Android Exploitation Tools |
|
|
248 | (1) |
|
Android Security Architecture |
|
|
249 | (1) |
|
Android Application Architecture |
|
|
249 | (1) |
|
|
250 | (1) |
|
Apple iOS Security Challenges |
|
|
251 | (4) |
|
|
252 | (2) |
|
|
254 | (1) |
|
|
254 | (1) |
|
Windows Phone Security Challenges |
|
|
255 | (2) |
|
Windows Phone OS Exploits |
|
|
255 | (1) |
|
Windows Phone Security Architecture |
|
|
255 | (1) |
|
Windows Phone Architecture |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
257 | (2) |
|
Chapter 12 Mobile Device Security Models |
|
|
259 | (20) |
|
|
260 | (3) |
|
The Android Security Model |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
Android SDK Security Features |
|
|
261 | (1) |
|
Rooting and Unlocking Devices |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
263 | (4) |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
267 | (1) |
|
Platform Application Security |
|
|
267 | (1) |
|
|
267 | (1) |
|
iOS and Android Evolution |
|
|
267 | (3) |
|
Android Version Evolution |
|
|
268 | (1) |
|
|
269 | (1) |
|
Security Challenges of Handoff-Type Features |
|
|
270 | (1) |
|
|
271 | (1) |
|
Security Using Enterprise Mobility Management |
|
|
272 | (3) |
|
|
273 | (1) |
|
Mobile Application Management |
|
|
273 | (2) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
276 | (3) |
|
Chapter 13 Mobile Wireless Attacks and Remediation |
|
|
279 | (18) |
|
Scanning the Corporate Network for Mobile Attacks |
|
|
280 | (1) |
|
|
280 | (3) |
|
Scanning the Network: What to Look For |
|
|
281 | (1) |
|
Scanning for Vulnerabilities |
|
|
282 | (1) |
|
The Kali Linux Security Platform |
|
|
283 | (2) |
|
Scanning with Airodump-ng |
|
|
284 | (1) |
|
Client and Infrastructure Exploits |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
Network Security Protocol Exploits |
|
|
287 | (3) |
|
|
287 | (1) |
|
Public Certificate Authority Exploits |
|
|
288 | (1) |
|
Developer Digital Certificates |
|
|
289 | (1) |
|
Browser Application and Phishing Exploits |
|
|
289 | (1) |
|
Drive-By Browser Exploits |
|
|
290 | (1) |
|
Mobile Software Exploits and Remediation |
|
|
290 | (5) |
|
Weak Server-Side Security |
|
|
291 | (1) |
|
|
291 | (1) |
|
Insufficient Transport Layer Protection |
|
|
292 | (1) |
|
|
292 | (1) |
|
Poor Authorization and Authentication |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
293 | (1) |
|
Security Decisions via Untrusted Inputs |
|
|
294 | (1) |
|
Improper Session Handling |
|
|
294 | (1) |
|
Lack of Binary Protections |
|
|
295 | (1) |
|
|
295 | (1) |
|
|
295 | (1) |
|
|
296 | (1) |
|
Chapter 14 Fingerprinting Mobile Devices |
|
|
297 | (20) |
|
Is Fingerprinting a Bad or a Good Thing? |
|
|
298 | (1) |
|
|
299 | (2) |
|
|
|
and Endpoint Fingerprinting |
|
|
299 | (1) |
|
Network Scanning and Proximity Fingerprinting |
|
|
299 | (1) |
|
Online or Remote Fingerprinting |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
|
303 | (2) |
|
|
303 | (1) |
|
|
304 | (1) |
|
Application Identification |
|
|
304 | (1) |
|
|
305 | (1) |
|
Unique Device Identification |
|
|
305 | (2) |
|
|
305 | (1) |
|
|
306 | (1) |
|
|
306 | (1) |
|
New Methods of Mobile Fingerprinting |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
308 | (1) |
|
Fingerprinting Users via Biometrics |
|
|
308 | (1) |
|
Spyware for Mobile Devices |
|
|
309 | (3) |
|
|
310 | (1) |
|
|
311 | (1) |
|
Fingerprinting on Modern Cellular Networks |
|
|
312 | (2) |
|
|
313 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (2) |
|
Chapter 15 Mobile MaLware and Application-Based Threats |
|
|
317 | (18) |
|
Malware on Android Devices |
|
|
318 | (5) |
|
|
319 | (1) |
|
Criminal and Developer Collaboration |
|
|
320 | (3) |
|
|
323 | (4) |
|
Excessive Application Permissions |
|
|
323 | (2) |
|
Malware on Apple iOS Devices |
|
|
325 | (1) |
|
Mobile Malware Delivery Methods |
|
|
326 | (1) |
|
Mobile Malware and Social Engineering |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
Mitigating Mobile Browser Attacks |
|
|
328 | (1) |
|
Mobile Application Attacks |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
Penetration Testing and Smartphones |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (2) |
Appendix A Answer Key |
|
335 | (2) |
Appendix B Standard Acronyms |
|
337 | (2) |
Glossary of Key Terms |
|
339 | (12) |
References |
|
351 | (12) |
Index |
|
363 | |