Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of ISO/IEC 27033 -- Information technology -- security techniques -- network security -- Part 6: Securing wireless IP network access
Bookmark Share

Text

ISO/IEC 27033 -- Information technology -- security techniques -- network security -- Part 6: Securing wireless IP network access

ISO/IEC - Organizational Body;

Contents:

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviated terms
5 Structure
6 Overview
7 Security threats
7.1 General
7.2 Unauthorized access
7.3 Packet sniffing
7.4 Rogue wireless access point
7.5 Denial of service attack
7.6 Bluejacking
7.7 Bluesnarfing
7.8 Adhoc networks
7.9 Other threats
8 Security requirements
8.1 General
8.2 Confidentiality
8.3 Integrity
8.4 Availability
8.5 Authentication
8.6 Authorization
8.7 Accountability (Non-repudiation)
9 Security controls
9.1 General
9.2 Encryption control and implementation
9.3 Integrity evaluation
9.4 Authentication
9.5 Access control
9.5.1 General
9.5.2 Permission control
9.5.3 Network-based control
9.6 Denial of service attack resilience
9.7 DMZ segregation via firewall protection
9.8 Vulnerability management though secure configurations and hardening of devices
9.9 Continuous monitoring of wireless networks
10 Security design techniques and considerations
10.1 General
10.2 Wi-Fi
10.2.1 General
10.2.2 User authentication
10.2.3 Confidentiality and integrity
10.2.4 Wireless Wi-Fi technologies
10.2.5 Other Wi-Fi Configurations
10.2.6 Access control — User equipment
10.2.7 Access control — Infrastructure access point
10.2.8 Availability
10.2.9 Accountability
10.3 Mobile communication security design
10.4 Bluetooth
10.5 Other wireless technologies
Annex A (informative) Technical description of threats and countermeasures
Bibliography


Availability
#
Perpustakaan Poltek SSN (Rak Referensi) R005.8 ISO i
b0002508
Available - Read on Location
Detail Information
Series Title
--
Call Number
R005.8 ISO i
Publisher
Geneva : ISO/IEC., 2016
Collation
vii, 26 hlm.; ilus.; 30 cm
Language
English
ISBN/ISSN
--
Classification
R005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
First edition
Subject(s)
Computer networks -- Security measures
Specific Detail Info
--
Statement of Responsibility
ISO/IEC
Other Information
Link
-
Daftar Isi
-
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?