Managing Risk in the Wireless Environment Buy on Amazon

https://www.ebooknetworking.net/books_detail-1933284471.html

Managing Risk in the Wireless Environment

PublisherIsaca
45.00 50.00 USD
Buy New on Amazon 🇺🇸 Buy Used — $30.00

Usually ships in 24 hours

Book Details

PublisherIsaca
ISBN / ASIN1933284471
ISBN-139781933284477
AvailabilityUsually ships in 24 hours
Sales Rank9,512,580
MarketplaceUnited States  🇺🇸

Description

This book will appeal to anyone involved in making the security of networks, wired and wireless, the absolute best. Security in wireless networks is substantially lower than that found in wired networks, precisely because the information-bearing signals are radiated into space. Wireless networks today are used as extensions to existing wired networks, which means that the security problems of a relatively small wireless segment of a network can suddenly become a security problem of the first magnitude for the entire network of an organization. To effectively implement wireless security, it is necessary to understand the technology and the ways that it can be exploited. It is necessary to implement appropriate controls and audits to ensure that the security measures called for in the security policy are, in fact, implemented and that they work as intended. This publication presents this information and more in an easy to understand approach.

This publication provides the necessary technical and security background to all practicing assurance, control and security professionals that they may confidently evaluate the security of wireless networks of all types, and make knowledgeable recommendations for improvements to security or to cost-effectiveness. Included are:

  • An overview of networking protocols and standards
  • A discussion of risk and vulnerability mitigation
  • Security policy for wireless networks
  • Best practices and practical considerations
  • A list of frequently asked questions
  • A table of wireless assurance functional objectives
  • An internal control questionnaire
  • A wireless security checklist
Donate to EbookNetworking
Prev
Next