Chapter 8 Key Terms Flashcards
Service set identifier
A unique name that identifies a wireless network.
Wireless access point (WAP)
A wireless access point broadcasts information and data over radio waves.
Wireless interface
The interface in a device, such as a laptop or smart phone, that connects to the wireless access point.
Rogue Access Points
Any unauthorized access point added to a network.
Initialization vector (IV)
A seed value used in encryption. The seed value and the key are used in an encryption algorithm to generate additional keys or encrypt data.
Radio frequency identification
RFID uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
Near Field Communication (NFC)
NFC allows two-way communication between two devices. The devices must be within a few centimeters of each other. NFC is a newer technology that is built on RFID.
Interference
A signal that corrupts or destroys a wireless signal. Interference can affect communication of access points and other wireless devices.
Wi-Fi Protected Access (WPA)
The most commonly used cryptographic protocol in use for wireless networks. WPA2 and WPA3 are the two versions in use.
Pre-shared key
Wireless access method that utilizes a passphrase for users to connect.
Wi-Fi Protected Setup (WPS)
Wireless access method that allows a device to securely connect to a wireless network without typing the PSK.
Open network
Wireless access method that has no authentication.
Captive portal
Wireless access method that forces a user to view and interact with it before accessing a network.
802.1x
Standard for local area networks that is used to authenticate users to a wireless network. It was created by The Institute of Electrical and Electronics Engineers Standards Association.
Remote Authentication Dial-In User Service
A protocol used to authenticate users in a enterprise environment to a wireless network.