Chapter 28: Securing Wireless Networks Flashcards
What are the components of a secure wireless connection?
- Encryption
- MIC
- Authentication
What do we use to protect the integrity of data in a wireless frame?
MIC (message integrity check)
Their were a wireless encryption method that been found to be vulnerable and is not recommended for use, name it!
WEP (Wired Equivalent Privacy)
What is used as an authentication framework when 802.1x is used on a WLAN?
EAP (Extensible Authentication Protocol)
Which Protocol should you avoid by selecting a method to protect the privacy and integrity of wireless data?
TKIP (Temporal Key Integrity Protocol)
What method dies the WPA2 use to ensure the data encryption and integrity?
CCMP (Counter/CBC-MAC Protocol)
The Wi-Fi Alliance offers a certification for wireless devices that correctly implement security standards, What is it?
WPA2 (Wi-Fi Protected Access Version 2)
Which wireless security configuration uses a pre-shared key?
WPA2 personal mode
WPA3 personal mode
How do we ensure message privacy in wireless networks?
By encrypting traffic
How does MIC work?
MIC creates a digital Stamp based on the transmitted data and encapsulates the Stamp in the encrypted message. The receiver de-encrypt the message and compares the Stamp with it own calculation to make sure the message has not been altered.
Describe the Open Authentication method.
Open authentication is true to its name; it offers open access to a WLAN. The only requirement is that a client must use an 802.11 authentication request before it attempts to associate with an AP. No other credentials are needed.
Where is Open Authentication method mainly used?
In public location (Normally the authentication then takes place in a form through a web browser where you can see and accept the terms for use and enter basic credentials)
Which encryption protocol does the WEP use?
The RC4 cipher algorithm based on shared key concept.
What is enabling 802.1x port-based access control provide?
It limits access to a network media until a client authenticates. This means that a wireless client might be able to associate with an AP but will not be able to pass data to any other part of the network until it successfully authenticates.
Where does authentication takes place in case of using 802.1x?
The authentication process occurs at a dedicated authentication server.