Chapter 13 Wireless and Mobile Security Flashcards

1
Q

What radio bands does WiFI rely on?

A

2.4GHz and 5GHz bands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WiFi security concerns

A

WiFi can travel beyond the spaces that an organization owns or controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WiFi standards/frequencies

A
  1. 11b 2.4GHz
  2. 11a 5GHz
  3. 11g 2.4GHz
  4. 11n 2.4 and 5GHz
  5. 11ac 5GHz
  6. 11ax 2.4 and 5GHz, additional fq in the 6 GHz band
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What range does Bluetooth operate in?

A

2.4GHz

Bluetooth devices are peer to peer, not client-server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Are bluetooth devices secure?

A

No. While bluetooth supports encryption, it replies on a PIN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is NFC used for?

What kind of attacks can be used?

A

very short range, often used for payment terminals.

Interception, replay attacks, spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does RFID work?

A

short range, uses a tag and a receiver to exchange info. can be deployed with:

  • active tags with their own power source and alway send signals to reader
  • semi-active tags which have battery power for their circuits but are activated by the reader.
  • passive tags, which are entirely powered by the reader.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RFID frequency ranges

A

Low frequency RFID - short range low power tags (entry access and identification)
High frequency tags - longer range, about 1 meter, faster speed.
Ultra high frequency - fastest to read and longest range. inventory and anti theft uses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RFID attack

A

RFID tags can be attacked in multiple ways from simple destruction to modification and reprogramming. Tags can be cloned, modified, spoofed, and impersonated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Infared

A

only works line of sight
supports everything from low bandwidth to gigabit speeds.
usually used for point to point connections between individual devices.
Infared has largely been replaced by bluetooth and wifi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GPS

A

GPS signals can be jammed or spoofed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Evil Twin Attack?

A

a malicious fake access point that is set up to appear legitimate. once the client connects to the evil twin, the attacker will often provide internet connectivity so the victim does not notice. the attacker can then capture all the victims traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Rogue Access Point?

A

Rogue access points are APs added to your network either intentionally or unintentionally that can offer a point of entry to attackers or other unwanted users.

Wireless IDS can prevent these

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is bluejacking vs. bluesnarfing?

A

Bluejacking simply sends unsolicited messages to bluetooth users.
Bluesnarfiing is unauthorized access to the device, typically aimed at data collection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Best protection against bluetooth attacks?

A

turn off bluetooth when not in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RF and Protocol attacks

What is disassociation?

A

Disassociation is what happens when a device disconnects from an access point. Many attacks work better if the attacker can force the victim to disconnect from the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can you force a victim to disassociate from a network?

A

send a deauthentication frame, which is a specific wireless protocol element that can be sent to the access point by spoofing the victims wireless MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RF and Protocol Attacks: Jamming

A

Jamming blocks all the traffic in a range or frequency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Wi-Fi Deauther vs Jammer

A

deauthers are often incorrectly called jammers. a deauther will send deauthentication frames where a jammer will send out powerful traffic to drown out traffic. Jammers are illegal in the US whereas deauthers are not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

WAP placement

A

Wireless access point placement can be decided using a site survey and a heat map. This can be done using a WiFi Analyzer software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

WLAN Controllers

A

Enterprise networks rely on a Wireless LAN (WLAN) controller to help manage access points and networks. Wireless controllers can be hardware devices, cloud service, VM, or software package.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Controller/AP Security

A

Much like other network devices, both controllers and APs need to be configured to be secure by:
changing default settings
disable insecure protocols and services
setting strong passwords
protecting administrative interfaces by placing them on isolated VLANs
ensuring they are regularly patched and updated
monitoring and logging should be turned on

23
Q

Wi-Fi Security standards

A

WPA-personal uses a preshared key and is often called WPA_PSK
WPA-enterprise relies on a RADIUS authentication server

24
Q

What encryption does WPA2 use?

A

WPA2 introduced the CCMP protocol, which uses AES encryption.

25
Q

WPA3 security improvments

A

WPA3 provides SAE (simultaneous authentication of equals), replaces preshared keys and requires validation.
It also provides for network authentication instead of only user authentication.

26
Q

What is perfect forward secrecy?

A

perfect forward secrecy changes encryption keys regularly so that a single key won’t compromise past or future communications.

27
Q

What are the 3 types of wireless authentication on modern wifi?

A

Open networks (includes captive portal)
Preshared Keys
Enterprise auth using RADIUS server and EAP

28
Q

Which EAP variant best fits the following:
___ wraps EAP using a TLS tunnel. Devices use unique encryption keys with (temporal key integrity protocol) TKIP implemented to replace keys on a regular basis.

A

PEAP

29
Q

Which EAP variant best fits the following:
Cisco developed protocol focused on providing faster re-authentication while roaming. Works around public key exchanges that slow down other variants by using a shared secret key for reauthentication. Can use preshared keys or dynamic keys.

A

EAP-FAST

30
Q

Which EAP variant best fits the following:
___ implements certificate based authentication. Uses certificates on both client and network devices to generate keys that are then used for communications. Used less frequently due to certificate management challenges.

A

EAP-TLS

31
Q

Which EAP variant best fits the following:
___ extends EAP-TLS and does not require a certificate. Problem is that it requires additional software on some devices whereas PEAP does not while providing similar functionality. There are times it may be implemented due to specific requirements.

A

EAP-TTLS

32
Q

Mobile device deployment: BYOD vs CYOD

A

In ‘Bring your own device’ the device is completely yours, you control it. Greatest risk to organizational data.
In ‘Choose your own device’ the organization owns it but you control and maintain it. can make security slightly easier.

33
Q

Mobile device deployment: COPE v. Corporate owned

A

COPE is corporate owned personally enabled which allows for some personal use on devices while meeting enterprise needs.
Corporate owned provides corporate with complete control but less flexibility

34
Q

What is VDI

A

virtual desktop infrastructure allows device users to connect to a remote environment, perform actions, and then return to normal device use.

35
Q

What is containerization?

A

containerization tools help split devices between work and personal use environments, allowing a personal container or work container to be run on the device without mixing data and access.

36
Q

Mobile device management

A
  • Mobile device management (MDM), unified endpoint management (UEM), and mobile application management (MAM) are all tools administrators and security professionals can use.
  • Functions include application delivery, configuration, update and version management, performance monitoring and analytics, logging, data gathering.
  • Although MAM are in use, MDM and UEM are taking over the market because they provide more control.
37
Q

UEM vs MDM

A

UEM is more capable than MDM

38
Q

MDM: name the described tool:
This may include deploying specific apps to all devices, limiting which apps can be used, remotely adding or removing applications, or monitoring application usage.

A

Application Management

39
Q

MDM: name the described tool:
This ensures secure access to files and/or CONTROL of organizational data. A major concern is the combination of business and personal data. This tool helps lock away business data in a controlled space.

A

Content Management.
note: can be easily confused with containerization or storage segmentation. Pay attention to the subtle differences: content management focuses on secure access and control, whereas containerization and storage segmentation focus on separation.

40
Q

MDM: name the described tool:
This is used when a device is lost or stolen, or when an employee is terminated. Admins must choose between the full version or only targeting organizational data and apps that have been deployed on personal devices. This can be a liability if personal data is accidentally impacted.

A

Remote Wipe

41
Q

MDM: name the described tool:
This allows you to use the location of a mobile device to make decisions about its operation. Some organizations only allow use inside certain facilities, while others wipe devices if they leave a security perimeter.

A

Geolocation/Geofencing
note: could be confused with context-aware authentication. the difference is that geolocation focuses on only location, whereas context-aware focuses on behavior, time, and authentication.

42
Q

MDM: name the described tool:
These are normal device security models to prevent unauthorized access. Most common for organizations is the amount of time before a screen locks and requires reauthentication. MDM might also set password length, complexity or require password change intervals.

A

Screen lock, passwords and PINs

43
Q

MDM: name the described tool:

Widely available on modern mobile devices, fingerprints and facial recognition are common.

A

Biometrics

44
Q

MDM: name the described tool:
This goes beyond PINs passwords and biometrics to better reflect user behavior. This may include location, hours of use, and a wide range of other behaviors.

A

Context-aware authentication
note: this will distinguish itself from geolocation and screen lock passwords pins by its depth, going beyond each of the other options.

45
Q

MDM: name the described tool:
Increasingly common to separate work and personal use on mobile devices. Greatly reduces the risk of cross contamination and exposure of sensitive data.

A

Containerization

46
Q

MDM: name the described tool:
can be used to keep personal and business data separate. This may include separate volumes of data that may require encryption. This and containerization can be combined.

A

Storage Segmentation

47
Q

MDM: name the described tool:

This is used to ensure stolen or lost devices do not result in a breach.

A

FDE

most effective when combined with remote wipe capabilities.

48
Q

MDM: describe the tool:

can be useful to alert users of issues or ask them to perform actions

A

Push notifications

49
Q

What is carrier unlocking?

A

allows phones to be used with other cellular providers

50
Q

What is sideloading?

A

manually installing programs or custom firmware on a device, typically after jailbreaking or rooting.

51
Q

What is a microSD HSM?

A

Same as other HSMs, they are hardware devices used to store and manage passwords and cryptographic keys in a very small form factor.

52
Q

What is SEAndroid?

A

SEAndroid provides the ability to enforce Mandatory Access Control over traditional Discretionary Access Control on Android devices.

53
Q

Which wifi standard introduced CCMP?

A

WPA2

54
Q

Which wifi standard introduced SAE?

A

WPA3