Chapter 4: Securing Your Network Flashcards
W-Fi Protected Access 2 (WPA2)
Uses Advanced Encryption Standard (AES) and Counter-mode/CBC-Mac protocol (CCMP).
WPA2 Pre-Shared Key (PSK) mode
Users access with PSK. Provides authorization, not authentication.
WPA 2 Enterprise Mode
Users authenticate with credentials. Uses 802.1X server, often RADIUS.
Wi-Fi Protected Access 3 (WPA3)
Uses Simultaneous Authentication of Equals instead of PSK.
Protected EAP (PEAP)
Uses TLS and requires a certificate on the 802.1X server
EAP-TTLS
Extension of PEAP allowing systems to use older authentication methods. Uses TLS and requires a certificate on the 802.1X server.
EAP-TLS
Uses TLS and requires certificates on both the 802.1X server and the client.
Bluejacking
Sending messages to devices.
Bluesnarfing
Stealing data from devices.
Bluebugging
Implementing a backdoor to devices.
Password Authentication Protocol (PAP)
Used with Point-to-Poiint Protocol (PPP). Sends in clear text.
Challenging Handshake Authentication Protocol (CHAP)
Client and server both know a shared secret used in the authentication process. Secret Is hashed after combined with nonce (number used once).
Remote Authentication Dial-In Service (RADIUS)
Centralized authentication service.
Only encrypts the password.
Terminal Access Controller Access-Control System Plus (TACAS+)
Encrypts the entire authentication process.
Uses multiple challenges and responses between the client and the server.