Ch. 11 Security Administration Flashcards
Bluejacking
Unsolicited messages are sent to Bluetooth devices when in range
Bluesnarfing
Data is taken from a Bluetooth device
BYOD
Bring Your Own Device
COPE
Company-Owned and Provided Equipment
CYOD
Choose Your Own Device
EDGE
Enhanced Data Rates for GSM Evolution. This does not fit neatly into the 2G/3G/4G spectrum, Technically considered pre-3G, but an improvement on GSM (2G). Developed by ETSI and bridged 2G and 3G networks.
Evil Twin
Rogue wireless access point that mimics the SSID of a legitimate access point
GSM
Global System for Mobile communications. AKA 2G
LTE
Long Term Evolution - Standard for wireless communication of high-speed data for mobile devices. AKA 4G
UMTS
Universal Mobile Telecommunications Systems - 3G standard based on GSM.
802.11a
The first wireless standard - 5-GHz with a max data rate 54 Mbps
802.11b
2nd wireless standard - max data rate 11 Mbps
IEEE 802.11g
2.4 GHz frequency range - downward compatible with 802.11b devices with a max data reduced to 11 Mbps - Max throughput 54 Gbps
802.11n
Can operate at 5 GHz or 2.4 GHz. Compatible with a, b, and g but might not support MIMO technology
MIMO
Multiple In Multiple Out technology uses two or more streams of data transmission to increase data throughput
IEEE 802.11n-2009
Uses MIMO - Gets bandwidth of up to 600 Mbps - uses multiple antennas to resolve more information coherently than possible using a single antenna
802.11ax
Consists of 802.11ac, 802.11ad, 802.11af
802.11ac
Approved January 2014, Throughput of up to 1 Gbps with at least 500 Mbps. It uses up to 8 MIMO
802.11ad
This standard was developed by the Wireless Gigabyte Alliance . Supports data transmission rates up to 7 Gbps- more than 10 times faster than the highest 802.11n rate.
802.11af
AKA “White-Fi” and “Super Wi-Fi” was approved in February 2014. It allows WLAN operation in the TV White space spectrum in the VHF and UHF bands between 54 and 790 MHz.
Wired Equivalent Privacy (WEP)
Flawed, oldest wireless security
WPA WiFi Protected Access (WPA)
Uses Temporal Key Integrity Protocol (TKIP), 128 bit per packet key, dynamically generates a new key for each packet. Introduced with Windows XP Service Pack 1, it combined authentication with encryption.
WPA2
Based on IEEE 802.11i standard. Provides AES (Advanced Encryption Standard) using the Counter Mode-Cipher Block Chaining (CBC)- Message Authentication Code (MAC) Protocol (CCMP)
Three different methods of wireless security
- WEP
- WPA
- WPA2
Disassociation
Attacker sends a deauthentication packet to the wireless access point, spoofing the user’s IP address. The user is logged off and deauthenticated on the WAP. Mutual authentication is the best defense against this.
NFC - Near Field Communication
Radio wave transmission that automatically connects when in range, which is a short distance. Traffic is not encrypted unless the user encrypts it.
Rogue Access Point
An unauthorized access point is set up and users connect to it
Evil Twin
Rogue Access Point that copies the SSID of a legitimate access point
ANT (Not an acronym)
Proprietary wireless network technology that provides low power modes, and it is used in Wi-Fi settings. Uses 2.4 GHz frequency with a range of about 30 meters.
Infrared
Not widely used today, has line-of sight issues
SATCOM
Satellite communications - data is not secure as it can go through an out-of-network device or service during communication.
Minimum Security Measures to be placed on Mobile Devices
- Screen Lock
- Strong Password
- Device Encryption
- Remote Wipe/Sanitation
- GPS Tracking
- Device Access Control
- Asset Tracking
- Content Management
Jailbreaking
User takes administrative/root control - Security controls are circumventing security controls f the iTunes store.
Sideloading
Transferring data between two devices and often associated with installing Android apps from places other than Google Play
Over-the-Air updates (OTA)
Whenever a device connects to your wireless network, the device is updated
Carrier-Unlocking
A security concern when you move from the carrier that issued to the phone to another carrier.