Book-Notes Section 13 Flashcards
๐ถ What are Bluetooth and Zigbee?
They are both wireless communication technologies used to connect devices without cables, but they are designed for different purposes.
๐ต Bluetooth โ For short-range, high-speed connections
โ
Best for: Transferring files, audio, or connecting devices like headphones, keyboards, or phones
๐ Range: Short (usually up to 10 meters)
๐ Speed: Faster (suitable for things like music or data transfer)
๐ Power usage: Medium to high
๐ฅ Connections: Usually 1-to-1 or a few devices
๐ง Example: Listening to music on wireless Bluetooth earbuds
๐ฃ Zigbee โ For low-power, low-speed, long-range smart devices
โ
Best for: Home automation and IoT (Internet of Things), like smart lights, thermostats, or door sensors
๐ Range: Longer (10โ100 meters, often with devices helping each other extend the range)
๐ Speed: Slower (enough for tiny bits of data, like turning a light on/off)
๐ Power usage: Very low (great for battery-powered sensors)
๐ฅ Connections: Supports many devices (like a smart home network)
๐ง Example: A smart home hub controlling dozens of light switches and sensors
๐ก What is an Ad Hoc Wireless Network?
An ad hoc network is a type of wireless network where devices connect directly to each other without needing a router or access point.
๐ง Simple Definition:
An ad hoc wireless network is when devices (like phones or laptops) talk directly to each other, like a peer-to-peer setup, instead of going through a central Wi-Fi router.
๐งพ Example:
Youโre with a friend and want to share files.
You set up a Wi-Fi direct or ad hoc connection between your laptops.
Now, your devices are connected without needing the internet or a Wi-Fi router.
๐ฆ Bluetooth โ Can Be Ad Hoc
Yes, Bluetooth can be used as an ad hoc network, especially in peer-to-peer connections.
Example:
You pair your phone with your friendโs phone via Bluetooth to send a file โ thatโs ad hoc.
Thereโs no central device โ just direct communication.
However:
In cases like using Bluetooth headphones or keyboards, itโs more like a simple paired connection, not a full network.
๐ฃ Zigbee โ Usually Not Ad Hoc
Zigbee typically uses a coordinator (central device) to manage the network, so itโs usually not ad hoc.
Instead, Zigbee uses a mesh network, where devices forward messages to each other through the coordinator.
However:
In special setups where devices talk directly without a coordinator, it could behave like an ad hoc network, but thatโs not the common use case.
๐ถ What does it mean that 5G needs greater antenna density?
It means that 5G networks need more antennas placed closer together than older networks like 4G or 3G.
๐ง Why?
Because 5G (especially the high-speed version, called mmWave) uses higher frequency signals. These signals:
๐ Donโt travel as far
๐งฑ Canโt pass through walls or buildings very well
๐ณ Are easily blocked by trees, glass, or even rain
So to make sure the signal reaches your phone reliably and quickly, 5G networks need:
โก๏ธ More antennas
โก๏ธ Placed closer together (high density)
โก๏ธ Often installed on light poles, rooftops, buildings, etc.
๐ What are Bluetooth Security Modes?
Bluetooth security modes define when and how security (like authentication and encryption) is applied during a Bluetooth connection.
Different versions of Bluetooth (like Bluetooth Classic vs Bluetooth Low Energy) use different modes โ but hereโs a simple look at the main four modes, mostly for Bluetooth Classic:
๐น Security Mode 1 โ No Security
๐ No authentication, no encryption
Devices connect freely with zero protection
โ Not recommended today
๐ง Example: Very old Bluetooth devices or early prototypes
๐น Security Mode 2 โ Service-Level Security
๐ Security is applied at the application/service level
Devices can connect without security, but specific services (like file sharing) may require pairing or encryption
Flexible but less secure, because the connection itself may be open
๐น Security Mode 3 โ Link-Level Security
๐ Security is enforced before the Bluetooth connection is established
Requires authentication and encryption for every connection
Used by devices that need strong security, like industrial or medical devices
๐น Security Mode 4 โ Secure Simple Pairing (SSP)
๐ Introduced in Bluetooth 2.1 and later
Supports Secure Simple Pairing with stronger encryption (AES-128)
Has different pairing methods based on the deviceโs capabilities:
Just Works
Passkey Entry
Numeric Comparison
Out-of-Band (like using NFC)
โ Most modern Bluetooth devices (like smartphones, speakers, and headsets) use this mode
๐ท๏ธ What are RFID tags?
RFID tags are little devices used for tracking or identifying things wirelessly using radio signals.
They come in three types based on how theyโre powered โ and this affects their range, cost, and use.
๐ 1. Active RFID Tags
โ
Have their own battery
๐ก Send signals on their own
๐ Can talk to readers from far away
๐ฒ More expensive, larger in size
๐ Range: Up to 100 meters or more
๐ง Used for: Vehicle tracking, toll systems, large asset tracking
๐ก 2. Semi-Active (Semi-Passive) RFID Tags
โ
Have a battery, butโฆ
โ Donโt transmit on their own โ wait for a reader to activate them
๐ Battery helps power the chip (so it can respond better)
๐ฒ Medium cost, smaller than active tags
๐ Range: Around 10 to 50 meters
๐ง Used for: Temperature sensors, warehouse tracking, shipping containers
โช 3. Passive RFID Tags
โ No battery
๐ก Get power from the RFID readerโs signal
๐ชถ Very small and cheap
๐ถ Need to be close to the reader
๐ Range: Very short โ usually a few centimeters to a few meters
๐ง Used for: Contactless credit cards, key cards, library books, inventory tags
๐ท๏ธ First โ Whatโs inside an RFID tag?
RFID tags have memory (like a tiny storage space) that holds data โ like an ID number or product info.
Depending on the type of tag, that memory can be:
Locked (read-only)
Editable (write or rewrite)
๐ 1. Read-Only Tags
โ
You can only read the data
โ You cannot change or delete it
Data is programmed once (usually at the factory)
๐ง Example:
A tag with a serial number hardcoded into it
Used for tracking assets where the ID never changes
โ๏ธ 2. Write-Only Tags
โ You can only write data to it
โ But you canโt read what you wrote (this is rare)
๐ง Example:
Used in secure environments where data must be hidden
Could be used for confidential logging (write-only box)
โ Not common in everyday RFID use
๐ 3. Rewritable Tags (Read/Write Tags)
โ
You can read and update the data many times
๐งน You can erase and rewrite it as needed
Very useful for dynamic info (like changing temperatures, locations, or status)
๐ง Example:
A warehouse tag that updates a productโs location
A shipping tag that logs temperature over time
๐๐จ What is an RFID-based tolling system?
An RFID-based tolling system is a wireless way to collect tolls from vehicles as they pass through a toll road or bridge โ without stopping.
Instead of paying cash or using a ticket, your car has an RFID tag, and toll sensors read it automatically when you drive by.
๐ง How does it work?
๐ Your car has a small RFID tag (usually a sticker or device on your windshield).
๐๏ธ You drive through a toll lane or under a gantry.
๐ก The system has RFID readers that scan your tag wirelessly.
๐ณ The system charges your account automatically.
No stopping. No barriers. Just drive through!
๐ท๏ธ What kind of tag is used?
Usually a passive RFID tag (no battery)
The toll reader sends a signal โ powers the tag โ reads its ID
โ
Benefits:
โฑ๏ธ Fast โ no need to stop or slow down
๐ซ Contactless โ no cash, no touching
๐ฎ Reduces traffic jams at toll booths
๐ Accurate and automated toll tracking
Passive RFID tags are typically short-range (a few centimeters to a few meters)โฆ
So how do RFID-based tolling systems work if cars are moving fast and may be farther away?
โ
So to clarify:
Yes, passive tags are short-range in most everyday uses (like credit cards or access cards).
But in toll systems, they use UHF passive RFID, which gives much longer range, perfect for reading tags on fast-moving vehicles.
๐ญ What is GPS spoofing?
GPS spoofing is when someone fakes GPS signals to trick a device into thinking itโs in the wrong location.
๐ง Itโs like someone holding a fake map in front of your GPS, saying:
โYouโre here!โ โฆwhen youโre actually somewhere else.
๐งช How does it work?
A GPS spoofer sends out fake satellite signals.
Your device picks up the fake signals instead of the real ones.
It calculates a false location or wrong time.
This can make:
A drone fly off course โ๏ธ
A ship think itโs in the wrong ocean ๐ข
A phone think itโs in another country ๐ฑ
๐ง Simple analogy:
Imagine youโre blindfolded, and someone is guiding you using GPS directions.
If they fake the directions, youโll walk into the wrong place โ even though youโre trusting the GPS.
Thatโs GPS spoofing โ the device is misled without knowing.
๐ฏ Why do people do GPS spoofing?
๐ซ To confuse drones or self-driving vehicles
๐ฐ To cheat location-based apps (like games, delivery, or mileage apps)
๐ต๏ธ To hide real locations of vehicles or people
โ ๏ธ For military or cyberattacks
break down the four wireless connection models โ point-to-point, point-to-multipoint, mesh, and broadcast โ in simple terms,
๐น 1. Point-to-Point (P2P)
๐ก One device talks directly to one other device.
Like a private conversation between two people
Very direct and secure
Often used for wireless bridges or linking two buildings
๐ง Example:
A wireless link between two offices across the street
๐ Key Features:
1 sender โ 1 receiver
Fast and reliable
๐ธ 2. Point-to-Multipoint (P2MP)
๐ก One device talks to many devices, but they donโt talk to each other.
Like a teacher talking to a classroom
Common in Wi-Fi networks (router to many clients)
One central node (base station or access point)
๐ง Example:
A Wi-Fi router connecting to multiple laptops and phones
๐ Key Features:
1 sender โ multiple receivers
Only the center (the โpointโ) can talk to everyone
๐ท 3. Mesh Network
๐ก All devices talk to each other โ no central point.
Like a group chat where everyone can pass messages
Great for resilience โ if one device fails, others can route around it
Used in smart homes, IoT, military, and disaster networks
๐ง Example:
Zigbee smart bulbs, where each bulb passes the signal to the next
๐ Key Features:
Every device = a node
Self-healing, decentralized
๐ 4. Broadcast
๐ก One device sends a signal to everyone within range โ no specific receiver.
Like a radio station โ whoever is listening can hear it
Used in TV, radio, emergency alerts, or certain Wi-Fi beacons
๐ง Example:
A Wi-Fi access point sending a โhello, Iโm here!โ beacon every few seconds
๐ Key Features:
One sender โ all receivers in range
No two-way communication by default
is wireless controller the same as AP?
The short answer is: No, wireless controllers and APs (Access Points) are not the same, but they work together in a wireless network.
Letโs break it down simply ๐
๐ถ What is an Access Point (AP)?
An Access Point is the device that creates the Wi-Fi signal.
It allows wireless devices (phones, laptops, tablets) to connect to a network.
It connects to the wired network and โtransmitsโ the wireless signal.
๐ง Think of an AP as the โWi-Fi hotspotโ that users connect to.
๐ง What is a Wireless Controller?
A Wireless Controller is a centralized system that manages multiple Access Points.
It tells APs:
How to handle security
Which channels to use
When to hand off clients between APs
Load balancing between busy APs
๐ง Think of the controller as the โbrainโ that manages all the APs in a large network.
๐ How do they work together?
In small setups (like homes), you might just have an AP or Wi-Fi router โ no controller needed.
In large networks (like schools, airports, or office buildings), a wireless controller manages dozens or hundreds of APs to keep the network running smoothly.
whatโs the difference between Evil twin and Rogue AP?
๐ฆนโโ๏ธ Evil Twin
โ
What it is:
An Evil Twin is a fake Wi-Fi network set up by an attacker to look like a real one โ same name (SSID), same appearance.
๐ฏ Purpose:
To trick users into connecting so the attacker can:
Steal login info
Capture sensitive data
Launch man-in-the-middle attacks
๐ง Example:
You go to a coffee shop and see Wi-Fi called CoffeeFreeWiFi.
An attacker sets up another access point with the same name.
You accidentally connect to the Evil Twin, thinking itโs legit โ now the attacker sees your traffic.
๐งจ Rogue Access Point (Rogue AP)
โ
What it is:
A Rogue AP is any unauthorized access point connected to a secure network, either:
Malicious (planted by an attacker)
Accidental (someone plugs in their own Wi-Fi router at work)
๐ฏ Purpose:
Can be used to bypass network security
Or just be an unapproved device creating a backdoor into the network
๐ง Example:
An employee brings a personal Wi-Fi router and plugs it into the office network โ now anyone can connect wirelessly without company monitoring. Thatโs a rogue AP.
๐ฏ In summary:
Evil Twin: Fake Wi-Fi that looks real โ made to trick users
Rogue AP: Unauthorized device connected to your real network โ can be accidental or malicious
๐ก What are Management Frames in Wi-Fi?
Wi-Fi communication is made up of different types of frames (like messages).
One important type is called a management frame.
๐ Management Frames are used to:
๐ฃ Announce a Wi-Fi network (beacons)
๐ถ Connect and disconnect devices (like association and disassociation)
๐ Handle roaming between access points (handshakes)
๐ง These frames are essential for devices to discover and manage connections to Wi-Fi networks.
๐ฌ Whatโs the problem with management frames?
In older Wi-Fi versions (WPA2 and below), management frames were not encrypted or protected.
That means attackers could:
Spoof them (pretend to be the access point)
Intercept or inject fake frames
Launch deauthentication attacks โ force users off the network
Trick devices into connecting to a fake (evil twin) AP
๐จ This is why public Wi-Fi could be risky โ attackers could mess with these frames easily.
๐ How does WPA3 help?
โ
WPA3 introduces Protected Management Frames (PMF)
PMF encrypts and authenticates management frames
This means attackers canโt forge or tamper with them
Devices and APs verify that the frames are legit and came from the real network
๐ก๏ธ Benefits of PMF (in WPA3):
Threat Protection with PMF
Deauthentication attacks โ Blocked (fake disconnects wonโt work)
Evil twin redirection โ Harder to fake legit signals
Frame injection/spoofing โ Invalid frames get rejected
๐ค Also used in WPA2 (optional), but in WPA3 itโs required
In WPA2, PMF was optional โ not all devices supported it.
In WPA3, PMF is mandatory, making every connection more secure by default.
๐ Blended WLAN (Blended Wi-Fi)
A blended WLAN is a wireless network setup that uses both standalone (fat) APs and controller-based (thin) APs together in the same environment.
Itโs called โblendedโ because youโre mixing different types of Wi-Fi access point models or management styles.
๐ง What are the two types of APs?
Type Description
Autonomous (Fat) APs Manage everything themselves โ security, DHCP, SSID broadcasting, etc. Like a mini-router.
Lightweight (Thin) APs Rely on a wireless controller to manage most functions. Just transmit the signal.
๐ฏ Why use a blended setup?
You might already have older fat APs installed but want to add newer controller-based APs.
You may have different security needs or coverage areas that work better with different AP types.
A phased upgrade โ blending old and new until everything moves to controller-based.
โ
Benefits of a Blended WLAN:
Cost-effective: Reuse existing hardware while expanding or upgrading
Flexible: Choose the right AP type for each location
Scalable: Gradually move toward a centralized system
โ ๏ธ Things to Watch For:
Managing both types can be complex without proper planning
Might require more effort to maintain consistent policies (like security and QoS)
Not ideal for very large or fast-moving environments unless well-integrated
๐ถ What is the Wi-Fiยฎ trademark?
The Wi-Fiยฎ trademark is the official brand name used to certify that a wireless device (like a router, phone, or laptop) meets certain technical standards for wireless communication โ specifically, the IEEE 802.11 standards.
โ
โWi-Fiโ is not just a general word โ itโs a registered trademark owned by:
The Wi-Fi Alliance
๐ง What is the Wi-Fi Alliance?
The Wi-Fi Alliance is a global non-profit organization that:
Develops Wi-Fi standards
Tests devices to ensure they meet interoperability, performance, and security requirements
Allows certified products to use the Wi-Fiยฎ logo
๐ What does the Wi-Fiยฎ trademark mean on a device?
If a device has the Wi-Fiยฎ logo, it means:
It has been certified by the Wi-Fi Alliance
It works with other Wi-Fi-certified devices
It meets specific standards for speed, frequency, and security (like WPA3)
๐ง Example:
Your phone says โWi-Fi 6 Certifiedโ โ this means it:
Uses 802.11ax (Wi-Fi 6)
Was tested by the Wi-Fi Alliance
Is allowed to display the Wi-Fi 6โข logo
๐ซ Can anyone use the Wi-Fi name or logo?
No โ itโs a protected trademark. Only devices that pass Wi-Fi Alliance certification tests can legally use the Wi-Fiยฎ name or logo in their marketing or packaging.
๐ First, what is Perfect Forward Secrecy?
Perfect Forward Secrecy means that even if someone steals your Wi-Fi password, they canโt go back and decrypt your past data.
It protects the privacy of your past sessions โ like old messages, emails, or passwords โ even if the network key is later compromised.
๐ถ How is it used in WPA3?
In WPA3, PFS is achieved using a better key exchange method called Simultaneous Authentication of Equals (SAE).
Hereโs what happens:
When your device connects to the Wi-Fi, it uses SAE to agree on a unique encryption key with the router.
That key is used only for that session.
Even though both devices know the Wi-Fi password, they never send it directly, and the session key is never reused.
If someone captures your encrypted traffic today and steals the password tomorrow โ they still canโt decrypt your past data.
โ Why this matters (compared to WPA2):
In WPA2:
If someone recorded your encrypted data and later got your Wi-Fi password, they could go back and decrypt your old traffic ๐ฌ
In WPA3:
Thanks to Perfect Forward Secrecy, each session is protected independently โ
๐ What is OWE?
OWE stands for Opportunistic Wireless Encryption.
Itโs a feature in WPA3 designed to make open Wi-Fi networks (like at airports, cafรฉs, or hotels) much more secure โ even when thereโs no password.
๐ง Why is it needed?
In older open Wi-Fi networks (like WPA2 open networks):
Thereโs no encryption at all
Anyone nearby can see your traffic
Tools like Wireshark can snoop on what youโre doing
So, open Wi-Fi = ๐ unsafe, even if itโs free.
โ
What OWE does (in simple terms):
OWE adds automatic encryption to open Wi-Fi networks, without needing a password.
Hereโs what happens:
You connect to an open Wi-Fi with OWE enabled.
Your device and the access point perform a secure key exchange (kind of like a secret handshake).
They generate a unique encryption key โ just for you.
Your traffic is now encrypted, even though you never entered a password!
โ Important Notes:
OWE โ authentication โ it still doesnโt verify who you are, but it does encrypt your data.
Itโs mainly for privacy, not identity.
Your device must support WPA3/OWE to benefit from it.
๐ What is PEAP?
PEAP stands for Protected Extensible Authentication Protocol.
Itโs a secure way to authenticate users on a network โ often used in enterprise Wi-Fi (like school, office, or corporate environments).
โ
Does PEAP require both client and server to have a certificate?
No โ only the server needs a certificate.
Letโs break it down:
๐ก๏ธ How PEAP works (simplified flow):
๐ก You try to connect to a secure Wi-Fi network using PEAP.
๐ฅ๏ธ The server sends its certificate to prove itโs trusted.
๐ฒ Your device checks that certificate and builds a secure encrypted tunnel.
๐ Inside the tunnel, you safely send your username and password to log in.
๐ง Bonus Tip:
PEAP is often used with EAP-MSCHAPv2 (for password-based logins).
If you wanted both server and client certificates, youโd use EAP-TLS instead.
difference between PEAP and EAP-TTLS
๐ First, what do they have in common?
Both PEAP and EAP-TTLS:
Are EAP variants (used for secure authentication over Wi-Fi or VPN)
Create a secure tunnel using TLS (like HTTPS) ๐
Only require a server certificate (not client certificate)
Protect the userโs login info (like username/password) from eavesdropping
โ
Summary:
Use PEAP if youโre in a Windows environment and just need username/password login over Wi-Fi.
Use EAP-TTLS if you want more flexibility or support for non-Windows systems or multiple back-end login systems.
๐ฑ๐ป What is VDI (Virtual Desktop Infrastructure)?
VDI means users access a virtual desktop that runs on a central server, not directly on their mobile device.
Itโs like streaming your desktop to your phone, tablet, or laptop โ all the apps, files, and work happen on the server, not on the device.
๐ So how does VDI make mobile device deployment more secure?
โ
1. No sensitive data stored on the device
With VDI, your files, emails, and apps are stored on the server, not on the mobile device.
If the device is lost or stolen, thereโs no data to steal.
๐ฆ Think of it like accessing a bank vault remotely, instead of carrying money in your pocket.
โ
2. Centralized security and control
IT teams manage everything in one place (the data center or cloud).
They can enforce:
๐ Strong passwords
๐ Regular updates
๐ซ App restrictions
๐งฏ Quick lockouts or shutdowns if needed
๐จโ๐ป So even if youโre on a personal phone or tablet, IT can still control the workspace.
โ
3. Reduced risk from malware or untrusted apps
Since apps run on the virtual desktop, theyโre isolated from any potentially dangerous apps on the mobile device.
The mobile device becomes more of a viewer than a worker.
โ
4. Easier compliance and auditing
All user activity happens on the virtual desktop, so itโs easier to:
Track logins and data access
Monitor behavior
Prove compliance with rules like HIPAA, GDPR, etc.
โ
5. Access from anywhere, securely
Users can access their desktop from any mobile device โ but the connection is encrypted and the data stays in the data center.
This supports BYOD (Bring Your Own Device) without sacrificing security.
๐ก๏ธ What is an RF-blocking bag?
An RF-blocking bag (also called a Faraday bag) is a special pouch or container made with metallic material that blocks radio signals from getting in or out.
RF = Radio Frequency
These bags block wireless communication like Wi-Fi, Bluetooth, GPS, and cellular signals.
๐ What does it mean when apps โuse wrappersโ?
An application wrapper is like a security layer thatโs added around an app to control how the app behaves โ without changing the appโs actual code.
๐ง Think of it like this:
Imagine wrapping a regular water bottle in a tamper-proof cover that:
Keeps it from leaking
Tracks if itโs opened
Prevents it from being shared
The wrapper doesnโt change the water inside โ it just adds extra controls around it.
โ
Why use wrappers?
Protect business data inside apps
Enforce security policies without rewriting the app
Let users use personal devices (BYOD) while still protecting company info
๐ง Example:
Letโs say a company uses an app like Microsoft Outlook for work email.
Without a wrapper:
The user could copy an email and paste it into WhatsApp or save files to personal storage ๐ฌ
With a wrapper:
The MDM enforces rules: no copy/paste to personal apps, no screenshots, auto-logout after inactivity โ all without modifying Outlook itself โ
โ
Summary:
In MDM, app wrappers add a security layer around apps to control what they can do โ helping protect company data without needing to rebuild the app.
difference between MDM (Mobile Device Management) and UEM (Unified Endpoint Management)
๐ฑ What is MDM?
MDM = Mobile Device Management
It focuses on managing mobile devices only, like:
Smartphones ๐ฑ
Tablets ๐ฒ
MDM lets companies:
Set security policies (like passcodes)
Wipe lost or stolen phones
Install or block apps
Control what users can or canโt do on their mobile devices
๐ป What is UEM?
UEM = Unified Endpoint Management
It does everything MDM does, plus more.
UEM manages all types of endpoints, not just mobile.
This includes:
Mobile devices (phones, tablets)
Laptops & desktops (Windows, macOS)
IoT devices (smart sensors, wearables)
Printers, smart TVs, and more
๐ง UEM = MDM + Laptop/Desktop/IoT management
MDM is great if you only need to manage mobile devices.
UEM is better for managing everything in one place โ phones, laptops, desktops, IoT, and more.
difference between SMS, MMS, and RCS
๐ฉ 1. SMS (Short Message Service)
๐งพ Text-only messages
๐ Limited to 160 characters
๐ถ Works on any phone โ even flip phones!
โ No pictures, videos, or group chats
โ Doesnโt need internet โ uses your cellular network
๐ง Think of SMS as the โoriginalโ text message.
๐ผ๏ธ 2. MMS (Multimedia Messaging Service)
๐จ Allows pictures, videos, audio, emojis, group messages
๐ถ Still uses cellular, not Wi-Fi
๐งฑ File size is usually limited (often <1MB)
Requires more data than SMS and may cost extra with some carriers
๐ง Think of MMS as โSMS with media.โ
๐ฑ 3. RCS (Rich Communication Services)
๐ฌ Next-gen texting โ like iMessage or WhatsApp but built into your default messaging app (on Android)
โ Supports typing indicators, read receipts, Wi-Fi/data messaging, large files, high-quality images, and group chats
๐ Not all RCS is end-to-end encrypted (depends on the provider)
๐ง Requires RCS support from both phones and carriers
๐ง Think of RCS as texting upgraded to feel more like a messaging app.