Chapter 4 Difficult Concepts Flashcards
Bluejacking
sending prank unsolicited messages
Bluesnarfing
unauthorized access to steal information like contacts, call logs etc on a device
blue bugging
attackers gain full control of a device
bluesmack
dos
blueborne
spread through theair to infect devices
enhanced open
aka opportunistic wireless encryption
provides individualized data encryption even in open networks
protects people in open wifi scenario
used by wpa3
SAE
A
simultaneous authentication of equals
replaces the 4 way handshake with a diffie hellman key
protects against offline dictionary attacks
Management Frame protection
ensures integrity of network management traffic
prevents eavesdropping, forging and tampering with management frames
used by wpa3
RADIUS
remote authentication dial in user service
offers authentication, authorization and accounting services
widely used for secure access to network resources
EAP
extensible authentication protocol
authentication frameowkr supporting multiple method
EAP FAST
T (Extensible Authentication Protocol-Flexible Authentication via Secure
Tunneling)
● Developed by Cisco Systems for secure re-authentication
Data Owner
a senior exec who labels info assets
Data Controller
entity responsibly for storage,
collection and usage
Data Processor
a group or individual hired by the data controller to assit with tasks like data collection and processing
Data Custodian
manages systems where data is stored
, enforces encryption, access controls
etc