Ch.9 Flashcards
an attack that sends unsolicited messages to Bluetooth-enabled devices
bluejacking
an attack that accesses unauthorized information from a wireless device through Bluetooth connection
bluesnarfing
a wireless technology that uses short-range radio frequency (RF) transmissions and provides rapid ad hoc device pairings
Bluetooth
an infrastructure that is used on public access WLANs to provide a higher degree of security
captive portal AP
a weak authentication protocol that has been replaced by the Extensible Authentication Protocol (EAP)
Challenge-Handshake Authentication Protocol (CHAP)
the encryption protocol used for WPA2 that specifies the use of a general-purpose cipher mode algorithm providing data privacy with AES
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
an AP set up by an attacker to mimic an authorized AP and capture transmissions, so a user’s device will unknowingly connect to this evil twin instead of the authorized AP
evil twin
a framework for transporting authentication protocols that defines the format of the messages
Extensible Authentication Protocol (EAP)
a 24-bit value used in WEP that changes each time a packet is encrypted
initialization vector (IV)
a proprietary EAP method developed by Cisco Systems requiring mutual authentication used for WLAN encryption using Cisco client software
Lightweight EAP (LEAP)
a method for controlling access to a WLAN based on the device’s MAC address
Media Access Control (MAC) address filtering
A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity
near field communication (NFC)
A weak authentication protocol that has been replaced by the Extensible Authentication Protocol (EAP)
Password Authentication Protocol (PAP)
The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating
preshared key (PSK)
an EAP method designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Protected EAP (PEAP)
Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal “noise” that creates interference and prevents communications from occurring
RF jamming
an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks
rogue access point
the alphanumeric user-supplied network name of a WLAN
service set identifier (SSID)