Items

Details

1. Overview of wireless technologies and security
A brief history of wireless
The benefits of modern wireless technology
The new risks created by wireless technology
Overview of modern wireless technology
Personal area networks
Bluetooth
InfraRed
Ultrawideband
ZigBee
Wireless USB
Wireless local area networks
802.11
900 MHz packet radio
Metropolitan area networks
Microwave
Free space optics
Ricochet
WiMAX
Wide area networks
Satellite
Cellular
BlackBerry
Paging
Other technologies of note
iMode
Short message service (SMS)
VoWiFi
Intel Centrino
Bibliography


2. Wireless threats, vulnerabilities, and security
Introduction
Wireless LANs
Wireless network security threats
Eavesdropping
Traffic analysis
Data tampering
Masquerading
Denial-of-service (DoS)
Wireless client attacks
Other issues
War-driving
The basic war-driving kit
Why are people war-driving?
War-chalking
War flying
War-driving and war-chalking ethics
Is it theft?
Is it harmful?
Is it stoppable?
Proactive measures
Common Wi-Fi security recommendations : actions versus reality
Personal digital assistants
PDA threats and vulnerabilities
Mobile device attacks
How a PDA connects to other computers
Viruses, Trojans, and worms
Theft of the PDA device
Data theft
Mobile code exploits
Authentication theft
DoS attacks
Session hijacking
PDA security
Anti-virus software
Other PDA security measures
Combating handheld attacks
Cell phones
Cell phone threats and vulnerabilities
SMS spoofing
Camera phones
Signal interception and interference
Viruses
Handset theft
Exploiting cellular technology : cell phone fraud
Viewing or changing phone settings
Phone network sniffing/scanning
SIM cloning
Phone tumbling
Subscription fraud
How does cellular fraud occur?
Detecting fraud
What is being done?
What can the user do?
New security
Cell phone hacking and phreaking
Phreaking
Disassemblers
Hackers tracking people
Vampire phones
Who's tracking you and your cell phone?
Enhanced-911
"Find friends"
PCP framework
Cell phone security
Combatting sniffing and cloning phones
PhonePrint
Cell phone jamming/silencing
Precautions for cellular phones
Other threats and vulnerabilities
Wireless denial-of-service attacks
Attach significance
Attack mitigation
GPS jamming
Identity theft
History and overview of identity theft
"Virtual" identity theft
Wireless identity theft
New technologies to help prevent identity theft
Identity theft and terrorism
Breeder documents
Corporate America and identity theft
Bibliography


3. Wireless crime fighting
Wireless crime prevention techniques
Introduction
E911
Police use of wireless devices
PacketCluster
TotalRoam
Hi-Tech patrol cars
Personal security and RFID
How does RFID work?
Personal security
Virtual prisons
Tagging stalkers and sex offenders
Wireless honeypots
Honeyd
FakeAP
How and where it's used
Bibliography


4. Digital forensic principles and wireless forensics
CyberCrime and forensic principles
What is cybercrime?
Types of cybercrime
Cracking
Harassment or cyberstalking
Corporate/economic espionage
Child pornography
Fraud and spam
Identity theft
Copyright piracy
Extortion
Investigating cybercrime
Principles of computer-based electronic evidence
Roles and responsibilities
Network forensics in a wireless environment
Points of evidence : where forensic fingerprints can be gathered
802.11 forensics
Introduction
Looking into a WLAN for forensic evidence
Where to find the hardware?
Identifying digital artifacts
Capturing wireless traffic
PDA forensics
The term "PDA" in forensics
Standard features of a PDA
Physical device structure
PDA operating systems
PDA memory and storage
Read-only memory (ROM)
Random-access memory (RAM)
PDA power sources
Summary of available software and tools
Palm pdd
Paraben's PDA Seizure
Pilot-Link
Guidance software's EnCase
POSE, palm operating system emulator
Conducting PDA forensics
Forensic rules for PDAs
Palm OS modes of operation
Palm OS reset options
Structure of the Palm OS
Cards
ROM
RAM
The HotSync process
The HotSync process : the steps
Palm communication methods
Bluetooth
Web clipping
Telephony
IrDA
Examination essentials : Palm OS
Security issues with PALM OS version 5.0
The cryptographic provider manager
The authorization manager
Protection inherent in the Palm OS
Frequently used encryption standards
Password protection options
PDA forensics on a Palm
Treatment of PDAs
The Palm OS flowchart processes using Paraben's PDA Seizure
Step 1 : close the HotSync program on the target machine
Step 2 : open PDA Seizure and run the acquisition wizard
Step 3 : examine the evidence
PDA forensics on a Windows CE/Pocket PC
Devices that use Windows CE/Pocket PC
What is Windows CE?
The difference between Pocket PC and Mobile PC
Pocket PC
Mobile PC
Windows CE desktop software
Reset options with Windows CE devices
Windows CE structure : ROM
Windows CE structure : RAM
Program memory
Storage memory : object store
What is the Windows CE registry?
The Windows CE acquisition process using Paraben's PDA Seizure
BlackBerry forensics
What is RIM BlackBerry?
Enterprise edition
Internet edition
Devices that use RIM BlackBerry
Fundamental differences between PDA OS and BlackBerry
Standard wireless connect
How does a BlackBerry connect?
Forensic rules for RIM BlackBerry operating system
Rule 1 : radio control/Faraday control
Rule 2 : power control
Rule 3 : cables and accessories
Rule 4 : data always changing
Rule 5 : understand fundamentals
How BlackBerry uses RAM
BlackBerry security
BlackBerry examination essentials
BlackBerry flowchart processes using Paraben's PDA Seizure
Cell phone forensics
Summary of available software and tools
BitPIM
GSM.XRY
Oxygen phone manager
MOBILedit!
Cell Seizure
TULP
SIMIS
ForensicSIM
Forensic card reader
SIMCon
Forensic rules for cellular phones
Rule 1 : stop wireless receiving
Rule 2 : charge device
Rule 3 : cabling and accessories
Rule 4 : acquire in laboratory
Cell phone flowchart processes using Paraben's Cell Seizure
Cell phone data storage
Device storage areas
SMS
The future : multimedia message service (MMS)
Cell phone acquisition process using Paraben's Cell Seizure
SIM card forensics
Sim card seizure rules
Forensic data associated with SIM cards
SIM data acquired
Data acquisition options
What data is available from mobile phones?
What do the providers keep?
How to analyze cell phone data
SIM card security
PIN versus PUK
Handling instructions for mobile phones
Recovery and packaging
Legal issues
Title III and the Electronic Communications Privacy Act (ECPA)
Issue 1 : Federal Wire Tapping Act
Issue 2 : stored data
Law enforcement questions
Private sector questions
Bibliography


5. The wireless future
Introduction
New twists
Wearable computers
Radio frequency identification (RFID)
Grocery shopping
Nightclubs
ShotCode
Grafedia
Pervasive computing and cultural shifts
Wireless shifts and trends
Social connectivity and entertainment
Young people will build relationships via wireless devices
Multitasking capabilities will flourish
Personal security and convenience
Personalization
Gap fillers
Convergence
Text will rival voice communications
New functionalities for wireless devices
The home element
Relationships, virtual communities, and beyond
Dating : how things are changing
Text messages and social familiarity
Mobile phones and friendships
Positive effects
Negative effects
Virtual communities
Characteristics of mobile communications
Characteristics of virtual communities
Characteristics of mobile virtual communities
Hints of tomorrow
Vivienne : the virtual girlfriend
City-sized HotSpots
Sports
Music
Dining
Commerce
RFID
New types of wireless information and trade
The universal wireless payment standard
Security and privacy : RFID passports
The concept
The concerns and consequences
Latest developments
Entertainment and travel
Television
24 conspiracy
The adult market
Music
Sports
Gambling
Travel
Agriculture
HealthCare
Noppa
VeriChip
Camera phones
Disaster recovery
Education
Military
Conclusion
Bibliography
Glossary.

Browse Subjects

Show more subjects...

Statistics

from
to
Export