CH 8 Securing Network Media and Devices Flashcards
EMI
cables due to electromagnetic conduction or radiation.
Crosstalk
HEARING ANOTHER PERSON TALK ON PHONE WHEN U ON P[HONE
Data emanation
emi by way easvdropping
Faraday cage .
sheilding an entire room
butt set
enabling a person to test a new line or listen in to a conversation.
ex wire tapping
■ Plugging in to an open port of a twisted-pair network:
Splitting the wires of a twisted-pair connection:
spectral analyzer to access data emanations:
wireless protcolds
Wireless Protocols Wireless Protocol Description Encryption Level (Key Size) WEP Wired Equivalent Privacy (Deprecated) 64-bit Also 128-bit but uncommon WPA Wi-Fi Protected Access 128-bit WPA2 Wi-Fi Protected Access Version 2 256-bit TKIP Temporal Key Integrity Protocol (Deprecated) Encryption protocol used with WEP and WPA 128-bit CCMP Counter Mode with Cipher Block Chaining Message Authentication Code Protocol Encryption protocol used with WPA2 Addresses the vulnerabilities of TKIP Meets requirements of IEEE 802.11i 128-bit AES Advanced Encryption Standard Encryption protocol used with WPA/ WPA2 Strongest encryption method in this table 128-bit, 192-bit, and 256-bit WEP
WPS
deprecated and insecure
technology that should not be allowed on a wireless network
point-to-multipoint.
single connects to multi point
usually in center of building
war-driving
looking for open acess when driving
war chalkiing
physically drawing symbols in public places that denote open, closed, or protected
wireless networks.