Wireless Operational Security

E

EAP, 231 “34

advantages, 231

authentication process, 232

authentication types, 234 “40

development, 232

dynamic key generation, 230

implementation, 232

LEAP, 234 “35

EAP-MD5, 237 “38

defined, 237

security risks, 238

EAP-TLS, 235 “36

advantages, 236

defined, 235

mutual authentication, 235

security features, 237

EAP-TTLS, 236 “37

authentication, 236, 237

defined, 236

Economic and Espionage Act of 1996, 10 “11

Economic espionage, 10

Elementary ACLs, 34

E-mail, 172 “74

nationwide search warrants for, 108

policy, 172 “74

Win32.Sobig.F worm, 172 “74

Employees

sabotage , 7 “8

termination procedures, 170

Enclave boundaries, 49

Encryption, 33 “34

for Access Control, 33 “34

defined, 33

settings, establishing, 178

Encryption schemes, 150 “56

AES, 150 “52

DES, 152 “54

RSA encryption, 155 “56

Triple DES, 154 “55

See also WLANs

Enterprise Encryption Gateways (EEGs), 264

Enterprise Wireless Gateways (EWGs), 264 “67, 272, 284, 301

appliances, 265 “66

defined, 264 “65

firewall features, 265

scalability, 267

selection, 266

software, 266

types of, 265

uses, 265

Eradication, 78 “79

Espionage, 72

economic, 10

industrial, 9 “12

Ethics, 113 “14

Ettercap, 206

Exploitable WLAN configurations, 199

Extensible Authentication Protocol (EAP), 271

External Access Controls, 36

Категории