Chapter 13 Flashcards
NFC (Near Field Communication)
Allows for very short range communication between devices. Example: Google wallet
RFID (Radio Frequency Identification)
A short range wireless technology that uses a tag and receiver to exchange information.
Evil Twin Attack
A fake access point that is set up to appear to be a legitimate trusted network.
Bluejacking
Unsolicited info is sent to a bluetooth device.
Bluesnarfing
Unauthorized access to a bluetooth device aimed at gathering information.
Site Survey
Moving throughout the entire facility or space to determine what existing networks are in place and to look at the physical structure for the location options for your access points.
WPA-Personal
Uses a preshared key and is often called WPA-PSK. Allows clients to authenticate without an authentication server.
WPA-Enterprise
Relies on RADIUS authentication server as part of an 802.1x implementation for authentication.
CCMP (Counter Mode Cipher Block Chaining Message Authentication Protocol)
Use AES (Advanced Encryption Standard) to provide confidentiality, stronger encryption, authentication for the user and access control abilities.
BYOD (Bring Your Own Device)
The user brings their own personally owned device. More freedom, lower cost, but greater risk.
CYOD (Choose Your Own Device)
The organization owns the device but allows the user to select and maintain it.
COPE (Corporate Owned Personally Enabled)
Corporate-provided devices allow reasonable personal use while meeting enterprise security and control needs.
FDE (Full Device Encryption)
The best way to ensure that stolen or lost devices don’t result in a data breach. Often combined with remote wiping capabilities.