Chapter 13. Flashcards
What did 802.11i bring?
Robust Wireless Security
What are the 5 categories of wireless security?
Data privacy and integrity Authentication, authorization, and accounting (AAA) Segmentation Monitoring Policy
What is a cipher?
An algorithm used to perform encryption.
Which the best cipher to use for wireless?
AES
What is AES?
A block cipher much stronger than RC4. Uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
What amendment introduced protection for authentication and association frames?
802.11w
What happened to the 802.11 data frame if data encryption is enabled?
If data encryption is enabled, the MAC Service Data Unit (MSDU) inside the body of any 802.11 data frame is protected by layer 2 encryption. Most of the encryption methods discussed in this chapter use layer 2 encryption, which is used to protect the layer 3–7 information found inside the body of an 802.11 data frame.
What is authentication? Give an example.
Authentication is the verification of identity and credentials. Users or devices must identify themselves and present credentials, such as usernames and passwords or digital certificates.
What is authorization? Give an example.
Authorization determines if the device or user is authorized to have access to network resources. This can include identifying whether you can have access based upon the type of device you are using (laptop, tablet, or phone), time of day restrictions, or location. Before authorization can be determined, proper authentication must occur.
What is accounting?
Accounting is tracking the use of network resources by users and devices. It is an important aspect of network security, used to keep a historical trail of who used what resource, when, and where.
What is segmentation and give examples as to how they would be segmented?
Segmentation is separating user traffic within a network. VLANS are used to segment the network.
What is open systems authentication?
Basically insures that both devices are 802.11. Authenticates the devices not the users. How does it work?
Open System authentication provides authentication without performing any type of
user verification. It is essentially a two-way exchange between the client radio and the
access point:
1. The client sends an authentication request.
2. The access point then sends an authentication response.
What cipher did WEP use?
RC4.
How long is a MAC address?
12 digit hexadecimal.
What happens when you cloak your SSID?
When you implement a closed network, the SSID field in the beacon frame is null (empty), and therefore passive scanning will not reveal the SSID to client stations that are listening to beacons.
Does cloaking your SSID also hide you from active scanning?
Yes it does, because the request probes will have a null SSID. The AP will then respond with a null SSID field, or will be ignored. AP will only respond to clients that are trusted or have associated before and their SSID field is filled with the correct SSID and not null.