Secure Wireless Protocols and What They are used for Flashcards
weakest form of wireless security, uses a 40 bit key that is easy to crack
Wired Equivalent Privacy (WEP)
replaces WEP as it uses the Temporal Key Integrity Protocol (TKIP), which is designed to be more secure thanWEP.
Wifi Protected Access (WPA)
much stronger than WPA as it uses Counter Mode with the Cipher Block Chaining Message Authentication Code Protocol.
-strongest version of ____ CCMP as it uses 128 bit AES for authentication
Wifi Protected Access Version 2 (WPA2)
introduced for home user who does not have an enterprise setup. The home user enters a password of the wireless router to gain access to the home network; common nowadays
WPA2 Preshared Keys (WPA2-PSK)
corporate version of WPA2 where a RADIUS server combines with 802.1x using certificates for authentication. It is used in a centralized domain environment
WPA2-Enterprise
WPA security configuration that could be used for backward compatibility with legacy systems.
WPA2-TKIP
is the strongest version of WPA2 as it uses 128 bit AES for authentication
WPA2-CCMP
When we access our wireless network or gaming console we may use ____, where the password is already stored and all you need to do is press the button to get connected to the wireless network–can be victim of brute force attack
WPA2-WPS
released in 2018 to address weaknesses in WPA2 and uses much stronger 256 bit Galois Counter Mode Protocol GCMP-256 for encryption. There are 2 versions personal for home users and enterprise for corporat
Wifi Protected Access Version 3 (WPA3)
Enterprise version that supports 256 bit AES
-uses Elliptec Curve DIffie Hellman EPhemeral (ECDHE) for initial handshake
WPA3 Enterprise
–government and finance departments
This uses SAE which means that users can use passwords that are easier to remember. Also uses PFS-perfect forward secrecy which ensures session keys cannot be compromised
WPA3 Personal
authentication framework allowing point to point connections
the WAP will send authentication information
Extensible Authentication Protocol (EAP)
version of EAP that encapsulates and encrypts the EAP data and makes it more secure for WLANS
used in VPN’s, Secure Network access, and enterprise wifi networks
Protected Extensible Authentication Protocol (PEAP)
developed by Cisco, is used in wireless networks and point to point connections to perform session authentication
–typically used in enterprises to provide secure and fast authentication
EAP-FAST
secure version of wireless authentication as it requires X509 certification. This is stored on endpoint
–used in high security environments such as financial, government, or corporate networks
EAP-TLS