ch 8 Flashcards
Wireless technology that uses short-range radio frequency (R F) transmissions
• Bluetooth
Established when two Bluetooth devices come within range of each other
• Piconet
Bluetooth V5 goes up to
800 ft
One active slave connected to two Masters
Scatter net
- an attack that sends unsolicited messages to Bluetooth-enabled devices
Text messages, images, or sounds
• Blue jacking
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection
• Bluesnarfing
A set of standards used to establish communication between devices in close proximity
Once devices are brought within 4 cm of each other or tapped together, two-way communication is established
• (NFC) Near field communication
contains information that other devices can read but does not read or receive any information
• Passive NFC device
can read information as well as transmit data
• Active NFC device
unencrypted NFC communication between the device and terminal can be intercepted and viewed
eavesdropping
attackers can ‘bump’ a portable reader to a user’s smart phone in a crowd and make an NFC connection and steal payment information stored on the phone
data theft
an attack can intercept the NFC communications between devices and forge a fictitious response
man-in-the-middle-attack
the theft of a smart phone could allow the attacker to use that phone for purchases
device theft
Commonly used to transmit information between employee identification badges, inventory tags, book labels, and other paper-based tags that can be detected by a proximity reader
• (R F I D) Radio frequency identification
Current version of RFID standards known as
Generation 2
a rouge RFID reader can determine the inventory on a store shelf to track the sales of specified items
unauthorized tag access
authentic RFID tags are replaced with what that contain fictitious data about products that are not in the inventory
fake tags
unauthorized users could listen in on communications between RFID tags and readers
eavesdropping
what is designed to replace or supplement a wired LAN
WLAN
Most influential organization for computer networking and wireless communications
Dates back to 1884
Began developing network architecture standards in the 1980s
Operates at AP 200 MW
• (IEEE) WLANS Institute of Electrical and Electronics Engineers
Standard for wireless local area networks (WLANs) Higher speeds (5.5 Mbps and 11 Mbps)
IEEE 802.11
Standard for wireless local area networks (WLANs)
Specifies maximum rated speed of 54Mbps using the 5GHz spectrum
• IEEE 802.11a
Standard for wireless local area networks (WLANs)
Preserves stable and widely accepted features of 802.11b and increases data transfer rates similar to 802.11a
• IEEE 802.11g
Standard for wireless local area networks (WLANs)
Ratified in 2009
Improvements: speed, coverage area, resistance to interference, and strong security
• IEEE 802.11n
Standard for wireless local area networks (WLANs)
Ratified in early 2014 and has data rates over 7 Gbps
• IEEE 802.11ac
Antenna and radio transmitter/receiver send and receive wireless signals
Bridging software to interface wireless devices to other devices
-Acts as “base station” for wireless network
• Access point (A P) major parts
A WLAN using an A P is operating
• infrastructure mode