Chapter 8 - Wireless Network Security Flashcards
Bluetooth
A wireless technology that uses short-range radio frequency (RF) transmissions and provides rapid ad hoc device pairings.
Ad hoc topology
A configuration in which networks can be created “on the fly” as needed.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluesnarfing
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection.
Near field communication (NFC)
A set of standards used to establish communication between devices in very close proximity.
Radio frequency identification (RFID)
A wireless set of standards used to transmit information from paper-based tags to a proximity reader.
Wireless local area network (WLAN)
A wireless network designed to replace or supplement a wired local area network (LAN). Commonly called Wi-Fi.
Access point (AP)
A centrally located WLAN connection device that can send and receive information.
Ad hoc mode
A WLAN functioning without an AP.
Rogue AP
An unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
Evil twin
An AP set up by an attacker to mimic an authorized AP and capture transmissions, so a users device will unknowingly connect to this evil twin instead of the authorized AP.
Wireless replay attack
A passive attack in which the attacker captures transmitted wireless data, records it, and then sends it on to the original recipient without the attackers presence being detected.
Jamming
Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal “noise” that creates interference and prevents communications from occurring.
Disassociation attack
A wireless attack in which false de-authentication or disassociation frames are sent to an AP that appear to come from another client device, causing the client to disconnect.
Wi-Fi protected setup (WPS)
An optional means of configuring security on wireless local area networks primarily intended to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs. Due to design and implementation flaws, WPS is not considered secure.