Chapter 13. Flashcards
What did 802.11i bring?
Robust Wireless Security
What are the 5 categories of wireless security?
Data privacy and integrity Authentication, authorization, and accounting (AAA) Segmentation Monitoring Policy
What is a cipher?
An algorithm used to perform encryption.
Which the best cipher to use for wireless?
AES
What is AES?
A block cipher much stronger than RC4. Uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
What amendment introduced protection for authentication and association frames?
802.11w
What happened to the 802.11 data frame if data encryption is enabled?
If data encryption is enabled, the MAC Service Data Unit (MSDU) inside the body of any 802.11 data frame is protected by layer 2 encryption. Most of the encryption methods discussed in this chapter use layer 2 encryption, which is used to protect the layer 3–7 information found inside the body of an 802.11 data frame.
What is authentication? Give an example.
Authentication is the verification of identity and credentials. Users or devices must identify themselves and present credentials, such as usernames and passwords or digital certificates.
What is authorization? Give an example.
Authorization determines if the device or user is authorized to have access to network resources. This can include identifying whether you can have access based upon the type of device you are using (laptop, tablet, or phone), time of day restrictions, or location. Before authorization can be determined, proper authentication must occur.
What is accounting?
Accounting is tracking the use of network resources by users and devices. It is an important aspect of network security, used to keep a historical trail of who used what resource, when, and where.
What is segmentation and give examples as to how they would be segmented?
Segmentation is separating user traffic within a network. VLANS are used to segment the network.
What is open systems authentication?
Basically insures that both devices are 802.11. Authenticates the devices not the users. How does it work?
Open System authentication provides authentication without performing any type of
user verification. It is essentially a two-way exchange between the client radio and the
access point:
1. The client sends an authentication request.
2. The access point then sends an authentication response.
What cipher did WEP use?
RC4.
How long is a MAC address?
12 digit hexadecimal.
What happens when you cloak your SSID?
When you implement a closed network, the SSID field in the beacon frame is null (empty), and therefore passive scanning will not reveal the SSID to client stations that are listening to beacons.
Does cloaking your SSID also hide you from active scanning?
Yes it does, because the request probes will have a null SSID. The AP will then respond with a null SSID field, or will be ignored. AP will only respond to clients that are trusted or have associated before and their SSID field is filled with the correct SSID and not null.
How are hidden networks, with masked ID’s discovered?
By using a layer 2 scanning tool or protocol analyzer and listening to the CLIENTS send data\control frames to the AP.
What is the most common wireless authentication method used in small businesses?
PSK or private shared key.
What is the default encryption method for 802.11 - 2012?
CCMP/AES encryption is the default encryption method
When 802.11i was ratified what certification was given to devices that where compliant?
WPA2 certification. WPA2 is a more complete implementation of the 802.11i amendment and supports both CCMP/AES and TKIP/RC4 dynamic encryption-key generation.
What happens during a client interaction on a robust security configured network? When the clients first communicate?
Two stations (STAs) must authenticate and associate with each other, as well as create dynamic encryption keys through a process known as the 4-Way Handshake. This association between two stations is referred to as an RSNA. In other words, any two radios must share dynamic encryption keys that are unique between those two radios.
An RSN can be identified by what field in a frame? What is the name of this field?
An RSN can be identified by a feld found in beacons, probe response frames, association request frames, and reassociation request frames. This field is known as the RSN Information Element (IE). This feld may identify the cipher suite capabilities of each station.
What is an authentication and key management protocol (AKMP)? and where is it used?
A system that require both authentication processes and the generation and management of encryption keys. Can be either a preshared (PSK) or an EAP protocol used during 802.1X authentication.
What are some ways that vendors are combating the issues with wireless preshared keys?
Creating databases that each user can have his\her own password. Simpler then setting up a radius server.