Muutke küpsiste eelistusi

E-raamat: Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise

  • Formaat: EPUB+DRM
  • Ilmumisaeg: 07-Mar-2022
  • Kirjastus: John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119883074
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 46,92 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 07-Mar-2022
  • Kirjastus: John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119883074
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutions

Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security.

Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage—including data published for the first time—of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes:

  • Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies
  • Effective technical resources and real-world sample architectures
  • Explorations of the relationships between security, wireless, and network elements
  • Practical planning templates, guides, and real-world case studies demonstrating application of the included concepts

Perfect for network, wireless, and enterprise security architects, Wireless Security Architecture belongs in the libraries of technical leaders in firms of all sizes and in any industry seeking to build a secure wireless network.

Foreword xxix
Preface xxxi
Introduction xxxv
Part I Technical Foundations 1(218)
Chapter 1 Introduction to Concepts and Relationships
3(42)
Roles and Responsibilities
4(7)
Network and Wireless Architects
4(1)
Security, Risk, and Compliance Roles
5(3)
Risk and Compliance Roles
5(1)
Chief Information Security Officer Roles
6(1)
Security Operations and Analyst Roles
7(1)
Identity and Access Management Roles
8(1)
Operations and Help Desk Roles
8(1)
Network Operations Teams
9(1)
Help Desk and End-User Support Roles
9(1)
External and Third Parties
9(2)
Technology Manufacturers and Integrators
10(1)
Vendor Management and Supply Chain Security Considerations
10(1)
Security Concepts for Wireless Architecture
11(19)
Security and IAC Triad in Wireless
11(3)
Integrity in Secure Wireless Architecture
12(1)
Availability in Secure Wireless Architecture
13(1)
Confidentiality in Secure Wireless Architecture
13(1)
Using the IAC Triad to Your Advantage
14(1)
Aligning Wireless Architecture Security to Organizational Risk
14(3)
Identifying Risk Tolerance
14(1)
Factors Influencing Risk Tolerance
15(1)
Assigning a Risk Tolerance Level
15(2)
Considering Compliance and Regulatory Requirements
17(2)
Compliance Regulations, Frameworks, and Audits
17(2)
The Role of Policies, Standards, and Procedures
19(3)
Policies
20(1)
Standards
20(1)
Procedures
20(1)
Example with Wireless Security
21(1)
Segmentation Concepts
22(1)
Why and When to Segment Traffic
22(1)
Methods to Enforce Segmentation
22(1)
Authentication Concepts
23(4)
Authentication of Users
24(1)
Authentication of Devices
25(1)
Authentication of Administrative Users
26(1)
Authentication of the Servers (for Captive Portals and/or 802.1X RADIUS)
26(1)
Authentication of the Wireless Infrastructure Components
26(1)
Cryptography Concepts
27(3)
Cryptographic Keys, Key Exchanges, and Key Rotation
27(1)
Cryptographic Algorithms and Hashes
27(1)
Tying It All Together
28(2)
Wireless Concepts for Secure Wireless Architecture
30(13)
Wireless Standards and Protocols
30(4)
Wireless Standards and Technologies
30(2)
Generations of 802.11 WLANs
32(1)
NAC and IEEE 802.1X in Wireless
33(1)
SSID Security Profiles
34(1)
Open Wi-Fi Security
34(1)
Personal (Passphrase) Wi-Fi Security
35(1)
Enterprise (802.1X) Wi-Fi Security
35(1)
Endpoint Devices
35(2)
Form Factors
36(1)
User-based vs. Headless
36(1)
RF Capabilities
36(1)
Security Capabilities
37(1)
Ownership
37(1)
Network Topology and Distribution of Users
37(8)
Campus Environments
38(1)
Remote Branch Environments
39(1)
Remote Worker Environments
40(1)
The Issue of Connectivity
41(2)
Summary
43(2)
Chapter 2 Understanding Technical Elements
45(56)
Understanding Wireless Infrastructure and Operations
45(11)
Management vs. Control vs. Data Planes
46(2)
Management Plane
46(1)
Control Plane
46(1)
Data Plane
47(1)
Cloud-Managed Wi-Fi and Gateways
48(4)
Today's Cloud-Managed Benefits for Enterprise
48(2)
Architectures with Cloud Management
50(1)
The Role of Gateway Appliances with Cloud-Managed APs
51(1)
Controller Managed Wi-Fi
52(1)
Local Cluster Managed Wi-Fi
53(2)
Remote APs
55(1)
Summary
55(1)
Understanding Data Paths
56(16)
Tunneled
58(1)
Bridged
59(2)
Considerations of Bridging Client Traffic
59(2)
Hybrid and Other Data Path Models
61(1)
Filtering and Segmentation of Traffic
62(9)
The Role of ACLs and VLANs in Segmentation
62(1)
Filtering Traffic within Wireless and Wired Infrastructures
63(1)
Filtering with Inter-Station Blocking on Wireless
64(1)
Filtering with SSIDs/VLANs on Wireless
65(1)
Filtering with ACLs on Wireless
65(1)
Controlling Guest Portals with DNS on Wireless
66(1)
Filtering with VLANs on Switches
67(1)
Filtering with ACLs on Routing Devices
68(2)
Filtering with Policies on Firewalls
70(1)
Filtering with Network Virtualization Overlay on Wired Infrastructure
71(1)
Summary
71(1)
Understanding Security Profiles for SSIDs
72(26)
WPA2 and WPA3 Overview
73(3)
Security Benefits of Protected Management Frames
75(1)
Transition Modes and Migration Strategies for Preserving Security
76(1)
Enterprise Mode (802.1X)
77(10)
Planning Enterprise (802.1X) Secured SSIDs
77(2)
Untangling the Enterprise (802.1X) SSID Security Options
79(3)
Enhancements with WPA3-Enterprise
82(1)
WPA3-Enterprise 192-bit Mode
82(1)
Deciphering the Acronyms of 192-bit Mode
83(2)
WPA2 to WPA3-Enterprise Migration Recommendations
85(2)
Personal Mode (Passphrase with PSK/SAE)
87(7)
Planning Personal/Passphrase-Secured SSIDs
87(1)
Enhancements with WPA3-Personal
88(4)
WPA2 to WPA3-Personal Migration Recommendations
92(2)
Open Authentication Networks
94(1)
Legacy Open Authentication Networks
94(1)
Wi-Fi Enhanced Open Networks
95(3)
Summary
98(3)
Chapter 3 Understanding Authentication and Authorization
101(72)
The IEEE 802.1X Standard
102(5)
Terminology in 802.1X
103(2)
High-Level 802.1X Process in Wi-Fi Authentication
105(2)
802.1X as the Iron Gate
106(1)
RADIUS Servers, RADIUS Attributes, and VSAs
107(16)
RADIUS Servers
107(1)
RADIUS Servers and NAC Products
108(2)
Relationship of RADIUS, EAP, and Infrastructure Devices
110(1)
RADIUS Attributes
111(4)
Common RADIUS Attributes
111(2)
RADIUS Attributes for Dynamic VLANs
113(2)
RADIUS Vendor-Specific Attributes
115(1)
RADIUS Policies
116(2)
RADIUS Servers, Clients and Shared Secrets
118(3)
Specifying RADIUS Clients
118(2)
RADIUS Shared Secrets
120(1)
Other Requirements
121(1)
User Directories
121(1)
Server Certificate
121(1)
Logging/Accounting
122(1)
Additional Notes on RADIUS Accounting
122(1)
Change of Authorization and Disconnect Messages
123(4)
EAP Methods for Authentication
127(13)
Outer EAP Tunnels
129(3)
EAP-PEAP
129(1)
EAP-TTLS
130(1)
EAP-FAST
130(1)
EAP-TEAP
131(1)
Securing Tunneled EAP
132(1)
Inner Authentication Methods
133(4)
EAP-TLS
134(1)
EAP-MSCHAPv2
135(1)
EAP-GTC
135(1)
EAP-POTP
136(1)
Legacy and Unsecured EAP Methods
137(1)
Recommended EAP Methods for Secure Wi-Fi
138(2)
MAC-Based Authentications
140(8)
MAC Authentication Bypass with RADIUS
140(7)
Overview of Typical MAB Operations
142(1)
Vendor Variations of MAC Operations
142(1)
Security Considerations for MAB
143(2)
Recommendations when Using MAB
145(2)
MAC Authentication Without RADIUS
147(1)
MAC Filtering and Denylisting
147(1)
Certificates for Authentication and Captive Portals
148(15)
RADIUS Server Certificates for 802.1X
148(3)
Endpoint Device Certificates for 802.1X
151(1)
Best Practices for Using Certificates for 802.1X
152(6)
Never Use Wildcard Certificates
153(1)
Never Use Self-Signed Certificates
153(1)
Always Validate Server Certificates
154(1)
Most Often, Use Domain-Issued Certificates for RADIUS Servers
154(3)
Use Revocation Lists, Especially for Endpoint Certificates
157(1)
Captive Portal Server Certificates
158(1)
Best Practices for Using Certificates for Captive Portals
159(3)
In Most Cases, Use a Public Root CA Signed Server Certificate
159(1)
Understand the Impact of MAC Randomization on Captive Portals
159(2)
Captive Portal Certificate Best Practices Recap
161(1)
Summary
162(1)
Captive Portal Security
163(5)
Captive Portals for User or Guest Registration
163(2)
Guest Self-Registration Without Verification
163(1)
Guest Self-Registration with Verification
163(1)
Guest Sponsored Registration
164(1)
Guest Pre-Approved Registration
164(1)
Guest Bulk Registration
164(1)
Captive Portals for Acceptable Use Policies
165(1)
Captive Portals for BYOD
166(1)
Captive Portals for Payment Gateways
167(1)
Security on Open vs. Enhanced Open Networks
167(1)
Access Control for Captive Portal Processes
167(1)
LDAP Authentication for Wi-Fi
168(1)
The 4-Way Handshake in Wi-Fi
168(3)
The 4-Way Handshake Operation
168(2)
The 4-Way Handshake with WPA2-Personal and WPA3-Personal
170(1)
The 4-Way Handshake with WPA2-Enterprise and WPA3-Enterprise
171(1)
Summary
171(2)
Chapter 4 Understanding Domain and Wi-Fi Design Impacts
173(46)
Understanding Network Services for Wi-Fi
173(14)
Time Sync Services
174(3)
Time Sync Services and Servers
175(1)
Time Sync Uses in Wi-Fi
175(2)
DNS Services
177(3)
DNS for Wi-Fi Clients and Captive Portals
177(2)
DNS for AP Provisioning
179(1)
DNS Security
179(1)
DHCP Services
180(6)
DHCP for Wi-Fi Clients
181(3)
Planning DHCP for Wi-Fi Clients
184(1)
DHCP for AP Provisioning
185(1)
Certificates
186(1)
Understanding Wi-Fi Design Impacts on Security
187(30)
Roaming Protocols' Impact on Security
188(5)
Roaming Impact on Latency-Sensitive Applications
189(1)
Roaming and Key Exchanges on WPA-Personal Networks
190(1)
Roaming and Key Exchanges on WPA-Enterprise Networks
191(2)
Fast Roaming Technologies
193(10)
Fast Reconnect
193(1)
PMK Caching (Roam-back)
194(2)
Opportunistic Key Caching
196(1)
Fast BSS Transition
197(1)
Summary of Fast Roaming Protocols
198(1)
Support for Fast Transition and Other Roaming
199(1)
Changes in Roaming Facilitation with WPA3 and Enhanced Open Networks
200(1)
Recommendations for Fast Roaming in Secure Wi-Fi
201(2)
System Availability and Resiliency
203(2)
Uptime, High Availability, and Scheduled Downtime
203(1)
Scheduled Maintenance and Testing
203(1)
AP Port Uplink Redundancy
204(1)
RF Design Elements
205(8)
AP Placement, Channel, and Power Settings
205(2)
Wi-Fi 6E
207(1)
Rate Limiting Wi-Fi
208(5)
Other Networking, Discovery, and Routing Elements
213(9)
Discovery Protocols
213(3)
Loop Protection
216(1)
Dynamic Routing Protocols
217(1)
Layer 3 Roaming Mobility Domains
217(1)
Summary
217(2)
Part II Putting It All Together 219(146)
Chapter 5 Planning and Design for Secure Wireless
221(60)
Planning and Design Methodology
222(5)
Discover Stage
223(1)
Phase 1: Define
223(1)
Phase 2: Characterize
224(1)
Architect Stage
224(1)
Phase 3: Design
225(1)
Iterate Stage
225(2)
Phase 4: Optimize
226(1)
Phase 5: Validate
227(1)
Planning and Design Inputs (Define and Characterize)
227(14)
Scope of Work/Project
228(2)
Teams Involved
230(3)
CISO, Risk, or Compliance Officer
231(1)
Security Analyst or SOC
231(1)
Identity and Access Management Team
231(1)
Network Architect and Network Operations Team
232(1)
Domain Administrators
232(1)
Help Desk
232(1)
Other System or Application Owners
232(1)
Vendors, Integrators, and Other Contractors
233(1)
Organizational Security Requirements
233(2)
Current Security Policies
235(1)
Endpoints
236(3)
Wireless Connection Type
236(1)
Form Factor
236(1)
Operating System
236(1)
Ownership
237(1)
Management
237(1)
Location
237(1)
User-Attached or Not
237(1)
Roaming Capabilities
238(1)
Security Capabilities
238(1)
Quantities
238(1)
Classification or Group
239(1)
Users
239(1)
System Security Requirements
239(1)
Applications
240(1)
Process Constraints
240(1)
Wireless Management Architecture and Products
241(1)
Planning and Design Outputs (Design, Optimize, and Validate)
241(11)
Wireless Connectivity Technology
241(1)
Endpoint Capability Requirements
242(1)
Wireless Management Model and Products
243(1)
RF Design and AP Placement
244(1)
Authentication
244(1)
Data Paths
245(1)
Wired Infrastructure Requirements
245(2)
Domain and Network Services
247(1)
Wireless Networks (SSIDs)
247(2)
System Availability
249(1)
Additional Software or Tools
249(1)
Processes and Policy Updates
250(1)
Infrastructure Hardening
251(1)
Correlating Inputs to Outputs
252(2)
Planning Processes and Templates
254(13)
Requirements Discovery Template (Define and Characterize)
254(7)
Sample Enterprise Requirements Discovery Template
255(2)
Sample Healthcare Requirements Discovery Template
257(2)
Defining BYOD in Your Organization
259(2)
Sample Network Planning Template (SSID Planner)
261(1)
Sample Access Rights Planning Templates
262(5)
Sample Access Rights Planner for NAC
264(1)
Sample Access Rights Planner for NAC in Higher Education
265(1)
Sample Simplified Access Rights Planner
266(1)
Notes for Technical and Executive Leadership
267(12)
Planning and Budgeting for Wireless Projects
268(3)
Involve Wireless Architects Early to Save Time and Money
268(1)
Collaboration Is King for Zero Trust and Advanced Security Programs
268(1)
Stop Planning 1:1 Replacements of APs
269(1)
Penny Pinching on AP Quantities Sacrifices Security
269(1)
Always Include Annual Budget for Training and Tools
270(1)
Consultants and Third Parties Can Be Invaluable
271(1)
Selecting Wireless Products and Technologies
271(4)
Wi-Fi Isn't the Only Wireless Technology
272(1)
The Product Your Peer Organization Uses May Not Work for You
273(1)
Don't Buy Into Vendor or Analyst Hype
273(1)
Interoperability Is More Important Now than Ever
274(1)
Expectations for Wireless Security
275(7)
Consider PSK Networks to Be the "New WEP"
275(1)
You're Not as Secure as You Think
276(1)
Get Control of Privileged Access, Especially Remote
277(1)
Make Sure You've Addressed BYOD
278(1)
Summary
279(2)
Chapter 6 Hardening the Wireless Infrastructure
281(84)
Securing Management Access
282(26)
Enforcing Encrypted Management Protocols
283(10)
Generating Keys and Certificates for Encrypted Management
283(4)
Enabling HTTPS vs. HTTP
287(2)
Enabling SSH vs. Telnet
289(2)
Enabling Secure File Transfers
291(1)
Enabling SNMPv3 vs. SNMPv2c
291(2)
Eliminating Default Credentials and Passwords
293(3)
Changing Default Credentials on Wireless Management
293(2)
Changing Default Credentials on APs
295(1)
Removing Default SNMP Strings
296(1)
Controlling Administrative Access and Authentication
296(5)
Enforcing User-Based Logons
297(2)
Creating a Management VLAN
299(2)
Defining Allowed Management Networks
301(1)
Securing Shared Credentials and Keys
301(2)
Addressing Privileged Access
303(4)
Securing Privileged Accounts and Credentials
303(2)
Privileged Access Management
305(1)
Privileged Remote Access
306(1)
Additional Secure Management Considerations
307(1)
Designing for Integrity of the Infrastructure
308(31)
Managing Configurations, Change Management, and Backups
309(4)
Configuration Change Management
309(3)
Configuration Baselines
312(1)
Configuration Backups and Rollback Support
312(1)
Monitoring and Alerting for Unauthorized Changes
313(1)
Configuring Logging, Reporting, Alerting, and Automated Responses
313(1)
Verifying Software Integrity for Upgrades and Patches
314(2)
Verifying Software Integrity
314(1)
Upgrades and Security Patches
315(1)
Working with 802.11w Protected Management Frames
316(5)
Wi-Fi Management Frames
317(1)
Unprotected Frame Types
317(1)
Protected Frame Types
318(1)
Validated vs. Encrypted
319(1)
WPA3, Transition Modes, and 802.11w
319(1)
Caveats and Considerations for 802.11w
320(1)
Provisioning and Securing APs to Manager
321(4)
Approving or Allowlisting APs
322(2)
Using Certificates for APs
324(1)
Enabling Secure Tunnels from APs to Controller or Tunnel Gateway
324(1)
Addressing Default AP Behavior
325(1)
Adding Wired Infrastructure Integrity
325(6)
Authenticating APs to the Edge Switch
326(3)
Specifying Edge Port VLANs
329(2)
Planning Physical Security
331(6)
Securing Access to Network Closets
331(1)
Securing Access to APs and Edge Ports
332(2)
Locking Front Panel and Console Access on Infrastructure Devices
334(3)
Disabling Unused Protocols
337(2)
Controlling Peer-to-Peer and Bridged Communications
339(14)
A Note on Consumer Products in the Enterprise
339(2)
Blocking Ad-Hoc Networks
341(1)
Blocking Wireless Bridging on Clients
342(2)
Filtering Inter-Station Traffic, Multicast, and mDNS
344(10)
SSID Inter-Station Blocking
344(2)
Peer-Based Zero Configuration Networking
346(1)
Disabling and Filtering Bonjour and mDNS Protocols
347(3)
Disabling and Filtering UPnP Protocols
350(1)
A Message on mDNS and Zeroconf from a Pen Tester
351(1)
Recommendations for Securing Against Zeroconf Networking
352(1)
Best Practices for Tiered Hardening
353(1)
Additional Security Configurations
354(8)
Security Monitoring, Rogue Detection, and WIPS
355(1)
Considerations for Hiding or Cloaking SSIDs
356(3)
Requiring DHCP for Clients
359(1)
Addressing Client Credential Sharing and Porting
360(2)
Summary
362(3)
Part III Ongoing Maintenance and Beyond 365(148)
Chapter 7 Monitoring and Maintenance of Wireless Networks
367(72)
Security Testing and Assessments of Wireless Networks
367(9)
Security Audits
368(2)
Vulnerability Assessments
370(3)
Internal Vulnerability Assessment
372(1)
External Vulnerability Assessment
373(1)
Security Assessments
373(2)
Penetration Testing
375(1)
Ongoing Monitoring and Testing
376(1)
Security Monitoring and Tools for Wireless
376(40)
Wireless Intrusion Prevention Systems
377(28)
WIDS vs. WIPS vs. Wired IPS
377(1)
Requirements for WIPS
378(1)
Integrated vs. Overlay vs. Dedicated
379(5)
Attacks WIPS Can Detect and Prevent
384(8)
Wireless Rogues and Neighbors
392(4)
WIPS Mitigation and Containment
396(2)
Legal Considerations of Over-the-Air Mitigation
398(2)
Spectrum Analyzers and Special-Purpose Monitoring
400(4)
Recommendations for WIPS
404(1)
Synthetic Testing and Performance Monitoring
405(2)
Security Logging and Analysis
407(3)
Security Event Logging
408(1)
Security Event Correlation and Analysis
408(2)
Wireless-Specific Tools
410(6)
Handheld Testers
410(2)
RF Design and Survey Software
412(3)
Network Protocol Analyzers
415(1)
Testing and Troubleshooting Applications
415(1)
Logging, Alerting, and Reporting Best Practices
416(8)
Events to Log for Forensics or Correlation
417(2)
Secure Management Access
418(1)
Infrastructure Integrity
418(1)
Client Security and Other WIPS
418(1)
Events to Alert on for Immediate Action
419(3)
Secure Management Access
419(1)
Infrastructure Integrity
420(1)
Client Security and Other WIPS
421(1)
Events to Report on for Analysis and Trending
422(2)
Secure Management Access
423(1)
Infrastructure Integrity
423(1)
Client Security and Other WIPS
424(1)
Troubleshooting Wi-Fi Security
424(8)
Troubleshooting 802.1X/EAP and RADIUS
425(3)
Things to Remember
425(1)
Things to Troubleshoot
426(2)
Troubleshooting MAC-based Authentication
428(3)
MAC Address Formatting
429(1)
MAC Authentication Bypass AAA Settings
429(1)
Settings on the RADIUS and Directory Servers
430(1)
Troubleshooting Portals, Onboarding, and Registration
431(1)
Troubleshooting with Protected Management Frames Enabled
431(1)
Training and Other Resources
432(5)
Technology Training Courses and Providers
432(3)
Wi-Fi Training and Certification
433(1)
IoT Wireless Training and Certification
434(1)
Network and Cyber Security Training
435(1)
Vendor-Specific Training and Resources
435(1)
Conferences and Community
436(1)
Summary
437(2)
Chapter 8 Emergent Trends and Non-Wi-Fi Wireless
439(74)
Emergent Trends Impacting Wireless
440(25)
Cloud-Managed Edge Architectures
440(1)
Remote Workforce
441(4)
Challenges Supporting Work from Home and Remote Users
442(1)
Balancing Additional Work and the Tech Talent Shortage
443(1)
Process Changes to Address Remote Work
443(1)
Recommendations for Navigating a Remote Workforce
444(1)
Bring Your Own Device
445(10)
Stats on BYOD and Policies
445(1)
Other Models for Ownership, Management, and Use
446(2)
Further Defining BYOD in Your Organization
448(1)
Legal Considerations for BYOD
449(2)
Technical Considerations for Securing BYOD
451(1)
Recommendations for Securing BYOD
452(3)
Zero Trust Strategies
455(8)
The Current State of Zero Trust
455(1)
Zero Trust Language
456(1)
Types of Zero Trust Products
457(3)
Segmentation Enforcement Models
460(2)
Zero Trust Strategy's Impact on Wireless
462(1)
Internet of Things
463(2)
LAN-based IoT
463(2)
Protocol-Translated IoT
465(1)
Protocol-Routed IoT
465(1)
Enterprise IoT Technologies and Non-802.11 Wireless
465(43)
IoT Considerations
466(1)
Technologies and Protocols by Use Case
467(35)
LAN-based IoT
468(2)
Bluetooth and BLE
470(5)
Smart Building and Home Automation
475(2)
Public Cellular for IoT
477(4)
Private Cellular and Cellular LANs
481(18)
Private WANs
499(2)
Industrial Automation
501(1)
Features and Characteristics Impact on Security
502(5)
Physical Layer and RF Spectrums
503(1)
Coverage
504(1)
Edge IP Protocols
505(1)
Topology and Connectivity
506(1)
Other Considerations for Secure IoT Architecture
507(1)
Final Thoughts from the Book
508(5)
Appendix A Notes on Configuring 802.1X with Microsoft NPS 513(8)
Wi-Fi Infrastructure That Supports Enterprise (802.1X) SSID Security Profiles
513(1)
Endpoints That Support 802.1X/EAP
514(1)
A Way to Configure the Endpoints for the Specified Connectivity
515(2)
An Authentication Server That Supports RADIUS
517(4)
Appendix B Additional Resources 521(10)
IETF RFCs
521(1)
Navigating and Reading RFCs
521(1)
Helpful RFCs and Links
522(1)
IEEE Standards and Documents
522(2)
Navigating and Reading IEEE Standards
523(1)
Helpful Links
523(1)
IEEE 802.11 Standard
523(1)
Wi-Fi Alliance
524(1)
Blog, Consulting, and Book Materials
524(1)
Compliance and Mappings
525(3)
NIST SP 800-53 and ISO 27001
525(3)
PCI Data Security Standards
528(1)
Cyber Insurance and Network Security
528(3)
Appendix C Sample Architectures 531(28)
Architectures for Internal Access Networks
532(19)
Managed User with Managed Device
533(6)
Security Considerations
533(1)
High-Security Architecture
534(2)
Medium-Security Architecture
536(2)
Low-Security Architecture
538(1)
Headless/Non-User-Based Devices
539(5)
Security Considerations
540(1)
High-Security Architecture
540(2)
Medium-Security Architecture
542(1)
Low-Security Architecture
543(1)
Contractors and Third Parties
544(3)
Security Considerations
545(1)
High-Security Architecture
545(1)
Medium-Security Architecture
546(1)
Low-Security Architecture
547(1)
BYOD/Personal Devices with Internal Access
547(2)
Security Considerations
547(1)
High-Security Architecture
548(1)
Medium-Security Architecture
548(1)
Low-Security Architecture
549(1)
Guidance on WPA2-Enterprise and WPA3-Enterprise
549(1)
Migrating from WPA2-Enterprise to WPA3-Enterprise
549(1)
Supporting WPA2-Enterprise with WPA3-Enterprise
550(1)
Guidance on When to Separate SSIDs
550(1)
Architectures for Guest/Internet-only Networks
551(8)
Guest Networks
551(2)
Security Considerations
551(1)
High-Security Architecture
552(1)
Medium-Security Architecture
552(1)
Low-Security Architecture
553(1)
BYOD/Personal Devices with Internet-only Access
553(2)
Security Considerations
553(1)
High-Security Architecture
554(1)
Medium-Security Architecture
555(1)
Low-Security Architecture
555(1)
Determining Length of a WPA3-Personal Passphrase
555(4)
Why Passphrase Length Matters
555(1)
Considerations for Passphrase Length
556(1)
Recommendations for Passphrase Lengths
557(2)
Appendix D Parting Thoughts and Call to Action 559(8)
The Future of Cellular and Wi-Fi
559(3)
Cellular Carrier Use of Unlicensed Spectrum
559(1)
Cellular Neutral Host Networks
560(2)
MAC Randomization
562(5)
The Purpose of MAC Randomization
562(1)
How MAC Randomization Works
562(1)
The Future of Networking with MAC Randomization
563(1)
Security, Industry, and The Great Compromise
564(3)
Index 567
JENNIFER (JJ) MINELLA is an internationally recognized authority on network and wireless security, author, and public speaker. She is an advisory CISO and information security leader with over fifteen years experience working with organizations creating network security and leadership strategies. She is Founder and Principal Advisor of Viszen Security.