nlike other Wi-Fisecurity books, which primarily focus on parameter setting or configuring acomputer, this book describes new approaches to wireless security enabled bythe recent development of new core technologies for Wi-Fi/802.11. These newdevelopments achieve what no amount of re-configuration can do: they solvethe problem at the source. This book focuses on how the new approaches workand how they should be applied to achieve maximum effect. It also brings tolight current weaknesses and offers practical, implementable solutions.
In the first section, “Wireless LAN Security Principals,” we look at the issues that everybody should know about security. Some of these issues are common sense but many are things that you may not have thought about. If you are already security expert, and just looking to find out how security works for Wi-Fi, you might skim this section as many of the principals will be familiar.
Chapter 3 discusses changing the security model, what the enemies are like, traditional security architecture, and the danger of passive monitoring.
Download the PDF of Chapter 3: “Why Is Wi-Fi Vulnerable to Attack?”
Reproduced from Real 802.11 Security: Wi-Fi Protected Access and 802.11i by permission of Addison-Wesley. ISBN 0321136209, copyright 2003. All rights reserved.