Wireless Operational Security

Chapter 2: Managing Access

Figure 2.1: Examples of Access Control Lists (ACLs).

Chapter 7: Wireless Networking Basics

Figure 7.1: How 802.11 works in the OSI Model.
Figure 7.2: A certificate chain.
Figure 7.3: A solo certificate.
Figure 7.4: A long certificate chain.
Figure 7.5: Certificate validation process.
Figure 7.6: Public key encryption and decryption as used in a PKI.
Figure 7.7: Certificate authority process hierarchy.
Figure 7.8: The digital signature process.
Figure 7.9: A mobile transaction involving multiple intermediaries.
Figure 7.10: Sign-on process involving an authentication server.
Figure 7.11: Federation of single sign-on domains.

Chapter 10: WLAN Risk and Threat Mitigation

Figure 10.1: The OSI model and an example of functional layering for WLANs.
Figure 10.2: Segmentation of wired and wireless network segments.

Chapter 12: WISDOM for WLAN Practitioners

Figure 12.1: WISDOM Basic Security topology.
Figure 12.2: WISDOM Intermediate Security topology.
Figure 12.3: WISDOM Advanced Security topology.

Категории