Chapter 8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

EAP (Extensible Authentication Protocol)

A framework for transporting the authentication protocols. Defines message format by using four types of packets: -Request -Response -Success -Failure

Media Access Control (MAC) address filtering

A method for controlling access to a WLAN based on the device's MAC address. Permits or block devices based on MAC address.

Wired Equivalent Privacy (WEP)

An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. It encrypts plaintext into ciphertext.

Wi-Fi Protected Setup (WPS)

An optional means of configuring security on wireless local area networks. Two common WPS methods: Pin method and Push-button method.

Rogue access point

An unauthorized access point that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks. Usually set up by an insider (employee)

Service Set Identifier (SSID)

The user-supplied network name of a WLAN. Usually broadcasted so that it is visible to any device.

WLAN (Wireless Local Area Network) attacks

a. Rogue access b. Evil twin access c. Wireless replay

Evil Twin Access Point

access point set up by an attacker that mimics an authorized AP and capture transmissions from users to evil twin AP

Wireless replay attack

also known as hijackings, the attacker captures transmitted wireless data, records it, and then sends it on to the original recipient without the attacker's presence being detected.

Bluesnarfing

an attack that accesses information from a wireless device through a Bluetooth connection. Often between cell phones and laptops, attackers can copy e-emails, contacts, or other data by connecting to the Bluetooth device without the owner's knowledge.

Bluejacking

an attack that sends unsolicited messages to Bluetooth-enabled devices. Considered more annoying than harmful and not data is stolen.

Wireless client network interface card adapter

antenna sends and receives signals through airwaves and performs same functions as wired adapter.

PSK (pre-shared key)

authentication for WPA

IEEE 802.1x

authentication used for WPA2. Originally developed for wired networks. Provides a greater degree of security by implementing port-based authentication. Blocks all traffic on a port-by-port basis until client is authenticated

Fat vs. Thin (ap type)

autonomous APs have the intelligence required to manage wireless authentication, encryption, and other functions for the wireless devices they serve (called Fat APs) "Lightweight" APs do not contain all the management and configuration functions found in Fat APs; thus, they are called Thin APs.

Wired Equivalent Privacy (WEP) vulnerabilities

can only use 64-bit or 128-bit number to encrypt. Initialization vector (IV) is only 24 of those bits, shorter length makes it easier to break. It also violates cardinal rule of cryptography (avoid a detectable pattern)

Standalone vs. Controller APs

controller APs can be managed through a dedicated wireless LAN controller (WLC). The WLC is the single device that can be configured to automatically distribute setting to all controller APs. Provides tools for monitoring the environment and offering information regarding the best locations for APs, wireless AP configuration settings, and power settings.

CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

encryption for WPA2

TKIP (Temporal Key Integrity Protocol)

encryption used in WPA. Uses a longer 128 bit key than WEP, dynamically generated for each new packet. Includes a Message Integrity Check (MIC), designed to prevent man-in-the-middle attacks.

Institute of Electrical and Electronics Engineers (IEEE)

established in 1884, an organization that for networking and wireless communication and develop network architecture standards. IEEE 802.11 - standard for wireless local area networks (WLANs) IEEE 8002.11n - improves speed, coverage area, and resistance to interference and strong security IEEE 8002.11ac- ratified in 2014 and has data rates over 7 Gbps.

Bluetooth piconet

establishes when a Bluetooth device comes within range of another. One device (master) controls all wireless traffic and the other device (slave) takes commands.

Network Hard edge

in a LAN network, it's a well-defined boundary that protects data and resources(wired).

WiFi Protected Access (WPA)

introduced in 20003 by the Wi-Fi Alliance. Encryption for WPA is accomplished by using Temporal Key integrity Protocol (TKIP)

Rouge AP system detection

probes that monitor the airwaves for traffic. Once a suspicious signal is detected by a wireless probe: The information is sent to a centralized database where WLAN management system software compares it to a list of approved APs. Any device not on the list is considered a rogue AP

WPA2 (Wi-Fi Protected Access 2)

second generation of WPA. Has tow mode: Personal and Enterprise.

Network Blurred edge

the introduction of WLANs in enterprises has changed hard edges to blurred edges (wireless)

Captiva Portal APs

users a standard web browser to provide information. Gives the wireless user the opportunity to agree to a policy or present valid login credentials

Bluetooth

wireless technology that uses short-range radio frequency (RF) transmissions. A personal Area Network (PAN) technology, current version is Bluetooth 5 with a range of 800 ft (243 meter)


संबंधित स्टडी सेट्स

MKT 411 - Test 2 (Chapters 5, 6, and 7)

View Set

Prep U Chapter 34: Assessment and Management of Patients with Inflammatory Rheumatic Disorders

View Set

Vaccinations and Organisms which are Vaccine Preventable

View Set

Conflict Resolution UNIT 2 - CHALLENGE 1

View Set

Us History- New National Government

View Set

Chapter 39: Oxygenation and Perfusion

View Set