Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
Dedication
About the Author
Preface
Acknowledgments
Chapter 1. Wireless Technology Overview
Abstract
The Wonder of Wandering Signals
Wireless Devices, Simplified
The Telecommunications Standards Landscape
Telecommunications Rules of Engagement
Wireless Communications Rules of Engagement
IEEE 802 Categories for Networking Standards
Wireless LAN or Wi-Fi (802.11x)
Wireless MAN or WiMAX (802.16)
Wireless PAN (802.15)
Radio Frequency Identification (RFID)
Supervisory Control and Data Acquisition
Where Do We Go From Here?
Endnotes
Chapter 2. Wireless Adoption
Abstract
Wireless Innovation and Adoption: Early Market Penetration
Wireless Market Penetration: US Context
Wireless Penetration Rates: Global Context
Wireless Penetration Rates: Security Risk Context
Hacking Goals: Strategies and Steps
Endnotes
Chapter 3. Blurred Edges: Fixed and Mobile Wireless Access Points
Abstract
The Hacking End Game
Differentiation Between Fixed and Mobile WAPs
Hacking Opportunities in Hybrid Networks and Communications Channels
Challenges for Securing Hybrid Networks and Communications Channels
Implications for Connections With Wired (Legacy) Networks and Systems
Recommendations for Wireless/Hybrid Systems
Importance of Context (Use Case Scenarios)
Endnotes
Chapter 4. Hacks Against Individuals
Abstract
Account Credentials Chain Attack
Public Wi-Fi Hotspot Attack
The Gullibles Travel Attack
The Internet of Hacked Things Attack
Endnotes
Chapter 5. WAPs in Commercial and Industrial Contexts
Abstract
Overview
Opportunities
Commercial Space Taxonomy
Endnotes
Chapter 6. WAPs in Medical Environments
Abstract
Medical EHRs
EHRs and Medical Devices
Takeaways
EHRs, Medical Devices, and ICS
Takeaways
Conclusion
Endnotes
Chapter 7. Hacking Wireless Access Points: Governmental Context
Abstract
Attack Chronology
Takeaways
Summary
Endnotes
Chapter 8. Noncivilian Government Context
Abstract
National Security
Public Safety and Emergency Management
Interoperability Challenges: People, Process, and Technology
Representative Challenges: Policy and Procedure (AKA Process Engineering)
Representative Challenges: Personnel (AKA Human Engineering)
Representative Challenges: Technology (AKA Network and Design Engineering)
The National Public Safety Broadband Network (AKA FirstNet)
National Security: Real-World Attack Scenarios
Takeaways
Endnotes
Chapter 9. Summary and Call to Action
Abstract
Thinking Like a Hacker: Aligning With Attack Methodologies
Call to Action for Organizations
Call to Action for Individuals
Call to Action for Automated Systems
The Importance of Thinking Earnestly
Conclusion
Endnotes
Appendix
Glossary
Index
← Prev
Back
Next →
← Prev
Back
Next →