REVISION 1 Flashcards

Summarize the following components of 802.11 WLAN security.

1
Q

summarize about data privacy

A

protecting users’ information by the means of cryptography

legible person (sender or receiver) can read the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA (Authentication, Authorization, and Accounting)

A

A framework that verifies the identity of users, grants or denies access based on permissions, and tracks user activities

password, biometric, OTP, smart cards and tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Institute of Electrical and Electronic Engineers (IEEE)

A

influential organization which establishes standards for telecommunications. They developed a computer network architecture standard which is Project 802

commonly referred as Wi-Fi, a standard technology to provide LAN communications using radio frequencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

International Organization for Standardization (ISO)

A

international nongovernmental organization made up of national standards bodies that develops and publishes a wide range of proprietary, industrial, and commercial standards

responsible for the creation of Open System Interconnection for data communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Open System Authentication

A

a process which a computer can gain access to a wireless network without any authentication optionally that uses the Wired Equivalent Privacy (WEP) protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shared Key Authentication

A

a client proving its identity to an access point using a pre-shared secret key. The key is used to encrypt and decrypt messages during the authentication process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WEP Encryption

A

encrypts wireless data using a shared key, making it unreadable to unauthorized users. However, its security flaws, such as predictable initialization vectors, make it vulnerable to attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virtual Private Network

A

encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely

traffic remains private as it travels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asymmetric Encryption

A

uses a public key-private key pairing and data encrypted with the public key can only be decrypted with the private key

RSA algorithm. In RSA, a pair of keys (public and private) are generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric encryption

A

a type of encryption where the encrypting and decrypting party parties share the same key prior to establishing the secure channel

WEP, TKIP and CCMP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly