The world of wireless and mobile devices is evolving day-to-day, with many individuals relying solely on their wireless devices in the workplace and in the home. The growing use of mobile devices demands that organizations become more educated in securing this growing technology and determining how to best protect their assets. Written by an industry expert, Wireless and Mobile Device Security explores the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, it goes on to discuss risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. The text closes with a look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.Jamming of the unlicensed radio spectruma#39;s 2.4 GHz and 5 GHz bands represents a major vulnerability. ... jammer for the unlicensed 2.4 GHz band can easily be constructed from old cordless phone circuit boards, which can be set to transmitanbsp;...
|Title||:||Wireless and Mobile Device Security|
|Author||:||Sean-Philip Oriyano, Jim Doherty|
|Publisher||:||Jones & Bartlett Publishers - 2015-01-02|