4.3 Given a scenario, secure a basic wireless network. Flashcards

1
Q

Wireless encryption

A

All wireless computers are radio transmitters and receivers - anyone can listen in
Solution: Encrypt the data• Everyone gets the password• Or their own password• Only people with the password can transmit and listen• WPA and WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WPA (Wi-Fi Protected Access)

A

2002: WPA was the replacement for serious cryptographic weaknesses inWEP (Wired Equivalent Privacy)
• Don’t use WEP
• Needed a short-term bridge between WEP and whatever would be the successor
• Run on existing hardware
• WPA: RC4 with TKIP (Temporal Key Integrity Protocol)
• Initialization Vector (IV) is larger and an encrypted hash
• Every packet gets a unique 128-bit encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Temporal Key Integrity Protocol

A

Temporal Key Integrity ProtocolMixed the keys
• Combines the secret root key with the IV
• Adds sequence counter - prevents replay attacks
• Implements a 64-bit Message Integrity Check
• Protects against tampering
• TKIP has it’s own set of vulnerabilities
• Deprecated in the 802.11-2012 standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WPA2 and CCMP

A

WPA2 certification began in 2004
AES (Advanced Encryption Standard) replaced RC4• CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) replaced TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CCMP block cipher mode

A

Uses AES for data confidentiality
128-bit key and a 128-bit block size
Requires additional computing resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CCMP security services

A

Data confidentiality (AES), authentication, and access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EAP

A

Extensible Authentication Protocol
An authentication framework
Many different ways to authenticate based on RFC standards
WPA and WPA2 use five EAP types as authentication mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EAP types

A

EAP-FAST - EAP Flexible Authentication via Secure Tunneling

Cisco’s proposal to replace LEAP (Lightweight EAP - previously used with WEP)• Lightweight and secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EAP-TLS (EAP Transport Layer Security)

A

Strong security, wide adoption• Support from most of the industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EAP-TTLS (EAP Tunneled Transport Layer Security)

A

Support other authentication protocols in a TLS tunnel• Use any authentication you can support, maintain security with TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protected Extensible Authentication Protocol -Protected EAP

A

Protected EAPCreated by Cisco, Microsoft, and RSA Security
• Encapsulates EAP in a TLS tunnel, one certificate on the server
• Combined a secure channel and EAP
• Commonly implemented as PEAPv0/EAP-MSCHAPv2
• Authenticates to Microsoft’s MS-CHAPv2 databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wireless security modes

A

Configure the authentication on your wireless access point / wireless router
• Open System - No authentication password is required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WPA-Personal / WPA-PSK

A

WPA2 with a pre-shared key• Everyone uses the same 256-bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPA-Enterprise / WPA-802.1X

A

Authenticates users individually with an authentication server (i.e., RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MAC filtering

A

Easy to find working MAC addresses
Limit access through the physical hardware address
Keeps the neighbors out through wireless LAN analysis
Security through obscurity (not actual security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Geofencing

A

Some MDMs allow for geofencing - Restrict or allow features when the device is in a particular area
Cameras - The camera might only work when outside the office
Authentication - The camera might only work when outside the office
Only allow logins when the device is located in a particular area