Section 21. 200 Wireless Security Settings Flashcards
Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
Wireless Security Settings
Crucial for securing wireless networks due to increasing usage
Wireless Encryption
Wireless encryption is essential for data confidentiality in wireless networks
Secures Wirless networks from data interception
WEP (Wired Equivalent Privacy)
■ Introduced in 1999 as part of IEEE 802.11
■ Utilises a static encryption key system
■ Considered insecure due to its weak 24-bit initialization vector
WPA (Wi-Fi Protected Access)
■ Introduced in 2003 as an improvement over WEP
■ Implemented TKIP for dynamic key generation
■ Inherited some vulnerabilities from WEP
■ Due to TKIP vulnerabilities, it was susceptible to cryptographic attacks
■ Insecure due to insufficient data integrity checks in the TKIP implementation
WPA2 (Wi-Fi Protected Access 2)
■ Introduced in 2004, replacing WPA
■ Uses AES protocol and CCMP protocol for stronger encryption:
● AES - Advanced Encryption Standard
● CCMP - Counter Cipher Mode with Block Chaining Message Authentication Code
Introduced Message Integrity Code (MIC) for integrity checking
WPA3 (Wi-Fi Protected Access 3)
■ The latest and most secure wireless security protocol
■ Uses AES for encryption and introduces new features.
WPA3 (Wi-Fi Protected Access 3) Features
Simultaneous Authentication of Equals (SAE)
Replaces the 4-way handshake with a Diffie-Hellman key
agreement
○ Protects against offline dictionary attacks
WPA3 (Wi-Fi Protected Access 3) Features
Enhanced Open (Opportunistic Wireless Encryption)
Provides individualised data encryption even in open networks
○ Improves privacy and security in open Wi-Fi scenarios
WPA3 (Wi-Fi Protected Access 3) Features
Updated Cryptographic Protocols
AES GCMP replaces AES CCMP used in WPA2
○ Supports both 128-bit and 192-bit AES for enhanced security
WPA3 (Wi-Fi Protected Access 3) Features
Management Frame Protection
○ Ensures the integrity of network management traffic
Prevents eavesdropping, forging, and tampering with
management frames
AAA Protocols
Important for centralised user authentication and access control
AAA Protocols examples
RADIUS (Remote Authentication Dial-In User Service)
○ Offers Authentication, Authorization, and Accounting services
○ Widely used for secure access to network resources
AAA Protocols examples
TACACS+ (Terminal Access Controller Access-Control System Plus)
Separates Authentication, Authorization, and Accounting
functions
○ More granular control
○ Encrypts the authentication process using TCP for enhanced security
Authentication Protocols
Used to verify user identity and control network access
Authentication Protocols examples
EAP (Extensible Authentication Protocol)
● Authentication framework supporting multiple methods
● Provides common functions and negotiation of authentication protocols