Module 10 Flashcards
What are the most widely used wireless networks?
Cellular networks, operated by telecom service providers.
What is the purpose of fixed wireless networks?
To provide internet access to areas with no wired infrastructure.
Who owns, manages, and charges for cellular networks?
Telecom providers.
What type of wireless technology uses radio frequency transmission?
Bluetooth.
What are some categories of Bluetooth use?
Automotive, Personal, Home Entertainment, Computer, Sports & Fitness, Health.
What are some examples of Bluetooth devices?
Hands-free system, wireless headphones, smart door locks, wireless keyboards, heart rate monitors, blood pressure monitors.
What are some common Bluetooth usage scenarios?
Browsing phone, creating playlists, controlling door locks remotely, monitoring heart rate and sleep, sampling data for analysis.
What is the latest Bluetooth version as of 2023?
Bluetooth 5.4.
What is Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) used for?
Sharing range with continuous connectivity.
What is the data rate for Bluetooth Low Energy (LE)?
1 Mbps, 2 Mbps, 3 Mbps.
What are the ranges for Bluetooth connectivity?
130 ft (40m), 260 ft (80m), 400 ft (120m).
What factors affect Bluetooth network topology?
Distance, transmission power, and antenna gain.
What are the roles in Bluetooth network topology?
Broadcaster, Observer, Follower (active and inactive).
What are the two types of Bluetooth network topology?
Point-to-point and point-to-multipoint.
What additional topology does Bluetooth LE support?
Many-to-many or mesh networks, which may extend the network range.
What is a scatternet?
A network of piconets, rarely used.
What is Bluejacking?
An attack that sends messages (text, sound, images) to Bluetooth devices, considered annoying but not harmful.
What is Bluesnarfing?
An attack that accesses and copies information through a Bluetooth connection.
What is Near Field Communication (NFC)?
A communication protocol allowing two electronic devices to communicate over 4 cm or less.
What are the roles in NFC communication?
Initiator (actively generates RF field) and Target (can be powered passively).
What are examples of NFC usage?
Wireless payments, public transport payment systems, computer setup.
What are NFC vulnerabilities?
Eavesdropping, data theft, MITM attacks, device theft.
What are defenses against NFC attacks?
Limiting range, encryption, secure elements, authentication.
What is Radio Frequency Identification (RFID)?
The use of radio waves to read and capture information from a tag attached to an object.
How far can an RFID tag be read from?
Several feet away, without requiring direct line-of-sight.
What is the maximum amount of data an RFID tag can transmit?
2048 bytes.
What are some uses of RFID?
Animal identification, inventory management, retail tracking, automated toll collection.
What are some RFID vulnerabilities?
Fake tags, data theft, undermining data integrity.
What are defenses against RFID attacks?
Encryption, secure protocols, physical security.
What common items contain embedded RFID chips?
Contactless credit cards, passports, hotel key cards, Enhanced Driver’s License (EDL).
How do RFID passports work?
Embedded in the front cover and must be open to transmit information.
What security measure makes it harder to steal passport RFID data?
The passport must be open for transmission, requiring attackers to steal the entire passport.
What is an Enhanced Driver’s License (EDL), and how does it use RFID?
Some states and border crossings use EDLs; biometric data is retrieved when an RFID signal is sent.
What information is stored on a hotel key card?
Dates of stay, room number, and authorized guests.
What type of RFID do hotel key cards use?
Low-frequency (LF) RFID.
Why is it difficult for attackers to steal RFID data from hotel key cards?
Short-range LF RFID limits the effectiveness of data theft.
What frequency does RFID blocking technology target?
13.56 MHz.
What type of RFID signals do RFID-blocking wallets block?
Low-frequency signals such as hotel room cards, building access cards, and ID badges.