REVISION 1 Flashcards
Summarize the following components of 802.11 WLAN security.
summarize about data privacy
protecting users’ information by the means of cryptography
legible person (sender or receiver) can read the message
AAA (Authentication, Authorization, and Accounting)
A framework that verifies the identity of users, grants or denies access based on permissions, and tracks user activities
password, biometric, OTP, smart cards and tokens
Institute of Electrical and Electronic Engineers (IEEE)
influential organization which establishes standards for telecommunications. They developed a computer network architecture standard which is Project 802
commonly referred as Wi-Fi, a standard technology to provide LAN communications using radio frequencies.
International Organization for Standardization (ISO)
international nongovernmental organization made up of national standards bodies that develops and publishes a wide range of proprietary, industrial, and commercial standards
responsible for the creation of Open System Interconnection for data communication
Open System Authentication
a process which a computer can gain access to a wireless network without any authentication optionally that uses the Wired Equivalent Privacy (WEP) protocol.
Shared Key Authentication
a client proving its identity to an access point using a pre-shared secret key. The key is used to encrypt and decrypt messages during the authentication process
WEP Encryption
encrypts wireless data using a shared key, making it unreadable to unauthorized users. However, its security flaws, such as predictable initialization vectors, make it vulnerable to attacks
Virtual Private Network
encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely
traffic remains private as it travels.
Asymmetric Encryption
uses a public key-private key pairing and data encrypted with the public key can only be decrypted with the private key
RSA algorithm. In RSA, a pair of keys (public and private) are generated
Symmetric encryption
a type of encryption where the encrypting and decrypting party parties share the same key prior to establishing the secure channel
WEP, TKIP and CCMP.