Linked e-resources

Details

1 Introduction; 2 What Is Highly Critical Wireless Networking (HCWN); 2.1 ZigBee; 2.2 Z-Wave; 2.3 Cellular Network Communication; 2.4 Wireless Mesh Networks; References; 3 Applications for HCWN; 3.1 Terrestrial Trunked Radio; 3.2 Medical Devices; 3.3 SCADA Systems; 3.4 Smart Grid; References; 4 Vulnerabilities and Security Issues; 4.1 Wireless Vulnerabilities; 4.1.1 Wireless Eavesdropping; 4.1.2 WEP and WPA Encryption; 4.1.3 Jamming; 4.1.4 Rogue Access Points; 4.1.5 Injection Attacks; 4.2 Medical Device Vulnerabilities; 4.3 Smart Grid, Mesh Network Vulnerabilities; References.

5 Modeling Threats and Risks5.1 Passive Attacks; 5.2 Active Attacks; References; 6 Modeling Vulnerabilities; References; 7 Governance and Management Frameworks; 7.1 FCC Rules; 7.2 Spectrum Sharing; 7.3 FDA; References; 8 Security Technologies for Networked Devices; 8.1 Basic Security Controls for All Wireless Networks; 8.2 Encryption; 8.3 Directional Transmission and Low Power Signals; References; 9 Known Weaknesses with Security Controls; References; 10 Competent Reliable Operation of HCWN; Reference; 11 Assessing the Effectiveness and Efficiency of Security Approaches.

11.1 WEP Legacy Issues11.2 Use of a DMZ for SCADA; References; 12 Examples in Brief; 12.1 SCADA Software from China; 12.2 Angen 9-1-1; 12.3 General Dynamics Smartphones; 12.4 Medical Devices at VA; 12.5 Drug Infusion Pump; References; 13 Testing the Resilience of HCWN; 13.1 Introduction; 13.2 Definitions; 13.3 Goals of Cyber Security Testing; 13.4 Types of Cyber Security Testing; 13.5 Network Communication Standards; 13.6 Wireless Networks by Geographical Range; 13.7 Wireless Operating Modes; 13.7.1 Infrastructure Network Mode; 13.7.2 Ad Hoc Network Mode; 13.7.3 Wireless Distribution Mode.

13.7.4 Monitor Mode13.8 Cyber Security Assessment Methodologies; 13.9 Security Testing Practical Applications; 13.9.1 Preparatory Stage; 13.9.1.1 Procedures, Documentation, and Limitations; 13.9.1.2 Deployed Hardware; 13.9.2 Scanning and Enumeration Techniques; 13.9.3 Passive Traffic Capture and Identification; 13.9.4 Simulated Attacks; 13.9.4.1 Attacks on Authentication; 13.9.4.2 Attacks on Wireless Cryptography; 13.9.4.3 Attacks on Captive Portals; 13.9.4.4 Attacks on Mesh Networks; 13.9.4.5 Attacks Against Common Security Appliances; 13.9.5 Post-Exploitation; 13.9.6 Reporting.

13.10 Vulnerability Management13.10.1 Incident Response; 13.10.2 Operational Security; 13.10.3 Vulnerability Classification; References; 14 Future Attack Patterns; 14.1 Cyberattacks; 14.2 Hybrid Attacks; 14.2.1 Against Facilities; 14.2.2 Against Consumer Products; 14.2.3 Against AWS; 14.2.4 Against Unmanned Vehicles; 14.2.5 Against Satellites, Weaponization of the Outer-Space and Interplanetary Internet; 14.2.6 Against Medical Equipment; 15 Assessing Cyberattacks Against Wireless Networks of the Next Global Internet of Things Revolution: Industry 4.0; 15.1 Introduction.

Browse Subjects

Show more subjects...

Statistics

from
to
Export