Ch 8 Key Terms Flashcards
secure tunnels client password authentication within TLS records
EAP-TTLS
CCMP
EAP-TLS
WEP-SHA1
EAP-TTLS
a centrally located WLAN connection device that can send and receive information
AP
WPA
WLAN
WPS
AP
designed to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs
WAP
WPA
WPS
WLAN
WPS
sends unsolicited messages to Bluetooth-enabled devices
Bluesmurfing
Blueponic
Bluejacking
Bluesnarfing
Bluejacking
an AP setup by the attacker; designed to mimic an authorized AP, so a user’s mobile device will unknowingly connect to this evil twin AP
evil twin
de-authentication
disassociation attack
rogue AP
evil twin
Wi-Fi Protected Access addresses both encryption and authentication; designed goal was to fit into existing WEP engine
WPS
WEP-SHA1
EAP
WPA
WPA
have the intelligence required to manage wireless authentication, encryption, and other functions for the wireless client device that they serve
WPS
AP
EAP-TLS
EAP-TTLS
AP
uses digital certificates for authentication
EAP-TLS
EAP-TTLS
WAP
WEP
EAP-TLS
authentication for the WPA2 Enterprise model; implements port-based authentication
IEEE 802.x1
IEEE 802.1q
IEEE 802.x
IEEE 802.1x
IEEE 802.1x
extraneous RF signal noise that creates interference and prevents communications from occurring
rogue AP
EMI
jamming
CCMP
jamming
a set of standards used to establish communication between devices in very close proximity
WPA
AP
RFID
NFC
NFC
designed to simplify the deployment of 802.1x by using MS Windows logins and passwords; creates an encrypted channel between the client and the authentication server, and the channel then protects the subsequent user authentication exchange
WPS
WAP
EAP
PEAP
PEAP
authentication for WPA Personal
PEAP
PSK
EAP
TKIP
PSK
functions as a wrapper around WEP by adding an additional layer of security but preserving WEP’s basic functionality
EAP
TKIP
PSA
WEP-SHA1
TKIP
encryption protocol used for WPA2; specifies the use of CCM with AES
TKIP
PSA
WPA
CCMP
CCMP
attacker creating false de-authentication frames that appear to come from another client device causing the client to disconnect from the AP
disassociation attack
rogue CCMP
jamming
evil twin
disassociation attack
an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks
AP
rogue AP
WPA
rogue WPA
rogue AP
devices can only communicate between themselves and cannot connect to another network
ad hoc mode
CCMP
WPA
infrastructure mode
ad hoc mode
an attack that accesses unauthorized information from a wireless device through Bluetooth connection, often between cell phones and laptop computers
Bluesnarfing
Bluejacking
Blueponic
Bluesmurfing
Bluesnarfing
most secure form of IEEE 802.1x authentication; each supplicant computer must have a digital certificate as proof of its identity
Extensible Authentication
digital certificate authentication
CCMP
certificate-based authentication
certificate-based authentication