Section 16 Securing Networks Flashcards
A user or administrator level account that is installed on a device by the manufacturer during production.
Default Accounts
Copper, fiber optic, and coaxial cabling used as the connectivity method in a wired network.
Network Media
A disturbance that can affect electrical circuits, devices, and cables due to radiation or electromagnetic.
Electromagnetic Interference (EMI)
A disturbance that can effect electrical circuits, devices, and cables due to AM/FM transmissions or cell towers.
Radio Frequency Interference (RFI)
Occurs when a signal transmitted on one copper wire creates an undesired effect on another wire.
Crosstalk
The electromagnetic field generated by a network cable or device when transmitting.
Data Emanation
Secured system of cable management to ensure that the wired network remains free from eavesdropping, tapping, data emanations, and other threats.
Protected Distribution System (PDS)
Uniquely identifies the network and is the name of the WAP used by the clients.
Service Set Identifier (SSID)
An unauthorized WAP or Wireless Router that allows access to the secure network.
Rouge Access Point
A rouge, counterfeit, and unauthorized WAP with the same SSID as your valid one.
Evil Twin
Same encryption key is used by the access point and the client.
Pre-Shared Key
Original 802.11 wireless security standard that claims to be as secure as a wired network.
Wired Equivalent Privacy
Replacement for WEP which sues TKIP, Message Integrity Check (MIC), and RC4 encryption.
WiFi Protected Access (WPA)
802.11; standard to provide better wireless security featuring AES with a 128 bit key, CCMP, and integrity checking.
WiFi Protected Access Version 2 (WPA 2)
Automated encryption setup for wireless networks at a push of a button, but is severely flawed and vulnerable.
WiFi Protected Setup (WPS)
Intentional radio frequency interference targeting your wireless network to cause a denial of service condition.
Jamming
Creates network segment for each client when it connects to prevent them from communicating with other clients on the network.
AP Isolation
Act of searching for wireless networks by driving around until you find them.
War Driving
Act of physically drawing symbols in public places to denote the open, closed, and protected networks in range.
War Chalking
Attack that targets an individual client connected to a network, forces it offline by deauthenticating it, and then captures the handshake when it reconnects.
WiFi Disassociation Attack
Occurs when an attacker continually guesses a password until the correct one is found.
Brute Force Attack
Uses AES-256 encryption with a SHA-384 hash for integrity checking.
WPA3 - Enterprise Mode
A secure password-based authentication and password authenticated key agreement method.
Simulations Authentication of Equals (SAE)
A feature of key agreement protocols (like SAE) that provides assurance that session keys will onto be compromised even if long term secrets used in the session keys exchange are compromised.
Froward Secrecy
Devices that use a radio frequency signal to transmit identifying information about the device or token holder.
Radio Frequency Identification (RFID)
Allows two devices to transmit information when they are within close range through automated pairing and transmission.
Near Field Communication (NFC)