6.6 Flashcards
The authentication process can be so much strengthened with – – – – which prevents the AP from authenticating anyways who is Mac address is not listed by the network administrator
Max filtering
Scramble data transmitted over the airwaves into a format that cannot easily be interpreted is the signal is intercepted
Encryption algorithm
For some measure of security 802.11 allows for optional encryption using Wep Offered in two forms of oil syndication
Open system authentication or shared key authentication
No key is used at all. The wireless access client knowing only the access points SSID, request authentication. The access point generates a single use code for that session only in the computer exceptional code
OSA
All wireless access coins use the same key which A key used to encrypt transmissions
Shared key authentication
 RC for Riverset cipher four Is now a – – – –encryption that is still widely used
Insecure
This improves wireless security for newer devices that can use WPA two acronyms with an acronyms are the only the beginning of what makes this protocol so interesting
CCMP
 This is an open source as an occasion and authorization service
Radius
This differs from other authentication protocols and that it only provides a framework for authenticated clients and servers it is not perform encryption authentication on its own instead it works with other encryption an authentication schemes to verify the credentials of users and devices
Extensible authentication protocol EAP
This protocol create an encrypted Telus tunnel between the supplicant in the server before proceeding with its usual EAP process
PEAP
Also a form of tunnel EAP this technology What is the valve by Cisco and works similarly to PIP except faster. The most important difference with – – – – – – Is that it uses protected access credentials which are so much similar to cookies that website store on users computer to track their activities
EAP fast
This more sophisticated security check me to text a Wi-Fi clients geographical position and activate resources to access according to that location
Geo fencing
When establishments in homeowners for that matter create an isolated – – – – – – – Through their Wi-Fi router access point this – – – – – as a separate SS ID and pass phrase and can be managed with different rules or time restrictions
Guest network
This technique is similar to a guest network but similar – – – – – – – allows a wireless client onto the net work but imposes firewall rules to restrict the clients ability to communicate with only the default gateway not other devices on the net work
Wireless client isolation
If you do you provide a guest at work either at home or at a business be sure to set up a – – – – – . This is the first page a new client she’s in the browser when connecting to the guest network and it usually requires the use of to agree to set of terms and conditions before canning for the access to the guest Netwerk
Captive portal