Book Review: Wireless Security and Privacy: Best Practices and Design Techniques
Title: Wireless Security and Privacy: Best Practices and Design TechniquesAuthor: Tara M. Swaminatha and Charles R. EldenPublisher: Addison-WesleyISBN: 0-201-76034-7Price: $39.99 USD
Security and Privacy: Best Practices and Design Techniques covers a potpourri of topics dealing with wireless computing. A number of devices that use wireless networking are discussed, ranging from Blackberries and PDAs to mobile phones and laptops. All of this is a lot to cover in 270 pages. I personally have experience with 802.11b networking (and need to learn more about security on my home LAN), and this book is not meant to fill that need.
Spread throughout the text are a number of references, primarily web sites, to go to for more information. These references are useful because the book covers a lot of ground. The bibliography also is thorough, and it would be helpful to place it on the publisher's web site as hypertext; the index and table of contents already are on-line.
The book is divided into four parts: "Establish a Foundation", "Know Your System", "Protect Your System" and "I-ADD". I-ADD is an acronym the authors developed to explain "how I add security to a system". It stands for identify targets, analyze attacks, define a strategy and design security in from the start.
Part I provides an introduction to the topic and defines terms, such as usability, authentication, access control and authorization and so forth. After defining the lingo, the authors' state, "Before continuing, you should have a good understanding of the principles of security, development and management" (p. 34). There is a big difference between a definition of a term and a good understanding of it. The introduction does, however, establish a working vocabulary for the wireless (and networked) field.
Part II, "Know Your System," includes chapters titled "Technologies", "Devices" and "Languages". "Technologies" discusses 802.11b, bluetooth and WAP. For each one, an overview of the architecture and physical layer is offered, and a brief introduction to security for each is presented. I previously knew bluetooth as a buzzword, this helped me gain a better understanding of it as a concept.
"Devices" covers a number of PDAs (generic, pocket PC, Palm) as well as Blackberries. The author discusses how Blackberries have a closed architecture, writing "there are advantages and disadvantages to having a closed architecture.... The security weaknesses are not easy to discover and, theoretically, less likely to be exploited." I have an issue with someone who advocates potential benefits of "security by obscurity". It all works okay until someone posts the exploit on the Web.
"Languages" includes sections on WML (wireless mark-up language) and WMLScript. The section on Java discusses its various versions, zeroing in on J2ME, Java 2 Micro Edition.
Part III covers more technical meat. It includes a chapter on cryptography that I found useful; I'm not an expert on encryption. I liked the advice to "Never roll your own cryptography" (p. 123). One glaring error can be seen in a diagram for Triple-DES, although the text has it right--the second block is decryption, not encryption.
The next chapter is titled "COTS", for commercial off-the-shelf products, and two pages are spent discussing COTS versus custom software. No mention is made of freeware/open-source technologies, nor the security benefits of having an open development model. Then it discusses VPNs, tunneling, the seven-layer OSI model, point-to-point tunneling (PPTP) and biometric authentication. I'm not sure what this had to do with COTS, except they are products you could buy.
I found the chapter on privacy to be excellent, discussing such topics as Carnivore (now DCS1000), the E-911 initiative and GPS in cell phones and other devices. An amusing anecdote is presented about a person who rented a car and had his account docked $450, because the hidden transmitter caught him speeding.
Part IV I could have done without. It is pages of bulleted, repetitive text about potential security compromises malicious or incompetent personnel can cause at various stages, if they handle your devices and data. The malicious developer who inserts Trojan Horses is mentioned in a number of places, but the book never mentions the most common security breach--social engineering.
If you have a need to understand a number of wireless devices, this is a useful book. I'm not sure, however, if this book is the place to learn "Best Practices and Design Techniques". I don't think I did. If you want to have a high level view of computer security risks, I recommend Bruce Schneier's Secrets and Lies. I still need to read Gast's 802.11 Wireless Networks to get a better understanding of my 802.11 network. Overall, I would have preferred if Wireless Security and Privacy skipped the last section and expanded the first three.
|Designing Electronics with Linux||May 22, 2013|
|Dynamic DNS—an Object Lesson in Problem Solving||May 21, 2013|
|Using Salt Stack and Vagrant for Drupal Development||May 20, 2013|
|Making Linux and Android Get Along (It's Not as Hard as It Sounds)||May 16, 2013|
|Drupal Is a Framework: Why Everyone Needs to Understand This||May 15, 2013|
|Home, My Backup Data Center||May 13, 2013|
- Linux Systems Administrator
- Senior Perl Developer
- New Products
- Technical Support Rep
- UX Designer
- Designing Electronics with Linux
- Dynamic DNS—an Object Lesson in Problem Solving
- Using Salt Stack and Vagrant for Drupal Development
- Making Linux and Android Get Along (It's Not as Hard as It Sounds)
- Have you tried Boxen? It's a
17 min 19 sec ago
- seo services in india
4 hours 48 min ago
- For KDE install kio-mtp
4 hours 49 min ago
- Evernote is much more...
6 hours 49 min ago
- Reply to comment | Linux Journal
15 hours 35 min ago
- Dynamic DNS
16 hours 9 min ago
- Reply to comment | Linux Journal
17 hours 7 min ago
- Reply to comment | Linux Journal
17 hours 57 min ago
- Not free anymore
21 hours 59 min ago
1 day 1 hour ago
Enter to Win an Adafruit Pi Cobbler Breakout Kit for Raspberry Pi
It's Raspberry Pi month at Linux Journal. Each week in May, Adafruit will be giving away a Pi-related prize to a lucky, randomly drawn LJ reader. Winners will be announced weekly.
Fill out the fields below to enter to win this week's prize-- a Pi Cobbler Breakout Kit for Raspberry Pi.
Congratulations to our winners so far:
- 5-8-13, Pi Starter Pack: Jack Davis
- 5-15-13, Pi Model B 512MB RAM: Patrick Dunn
- 5-21-13, Prototyping Pi Plate Kit: Philip Kirby
- Next winner announced on 5-27-13!
Free Webinar: Hadoop
How to Build an Optimal Hadoop Cluster to Store and Maintain Unlimited Amounts of Data Using Microservers
Realizing the promise of Apache® Hadoop® requires the effective deployment of compute, memory, storage and networking to achieve optimal results. With its flexibility and multitude of options, it is easy to over or under provision the server infrastructure, resulting in poor performance and high TCO. Join us for an in depth, technical discussion with industry experts from leading Hadoop and server companies who will provide insights into the key considerations for designing and deploying an optimal Hadoop cluster.
Some of key questions to be discussed are:
- What is the “typical” Hadoop cluster and what should be installed on the different machine types?
- Why should you consider the typical workload patterns when making your hardware decisions?
- Are all microservers created equal for Hadoop deployments?
- How do I plan for expansion if I require more compute, memory, storage or networking?