Securing Networks Flashcards
A user or administrator-level account that is installed on a device by the
manufacturer during production
Default Accounts
Occurs when a user is able to gain the rights of another user or
administrator
Privilege Escalation
§ A way of bypassing normal authentication in a system
Backdoor
Copper, fiber optic, and coaxial cabling used as the connectivity method
in a wired network
Network Media
A disturbance that can affect electrical circuits, devices, and cables due to
radiation or electromagnetic conduction
Electromagnetic Interference (EMI)
A disturbance that can affect electrical circuits, devices, and cables due to
AM/FM transmissions or cell towers
Radio Frequency Interference (RFI)
Occurs when a signal transmitted on one copper wire creates an
undesired effect on another wire
Crosstalk
The electromagnetic field generated by a network cable or device when
transmitting
Data Emanation
Secured system of cable management to ensure that the wired network
remains free from eavesdropping, tapping, data emanations, and other
threats
PRotected Distribution System (PDS)
Uniquely identifies the network and is the name of the WAP used by the
clients
Service Set Identifier (SSID)
An unauthorized WAP or Wireless Router that allows access to the secure
network
Rogue Access Point
A rogue, counterfeit, and unauthorized WAP with the same SSID as your
valid one
Evil Twin
§ Same encryption key is used by the access point and the client
Pre-Shared KEy
Original 802.11 wireless security standard that claims to be as secure as a
wired network
Wired Equivalent Privacy
Replacement for WEP which uses TKIP, Message Integrity Check (MIC),
and RC4 encryption
Wifi Protected Access (WPA)
802.11i standard to provide better wireless security featuring AES with a
128-bit key, CCMP, and integrity checking
Wifi Protected Access version 2 (WPA2)
Automated encryption setup for wireless networks at a push of a button,
but is severely flawed and vulnerable
WiFi Protected Setup (WPS)
Intentional radio frequency interference targeting your wireless network
to cause a denial of service condition
Jamming
Creates network segment for each client when it connects to prevent
them from communicating with other clients on the network
AP Isolation
Act of searching for wireless networks by driving around until you find
them
War Driving
Act of physically drawing symbols in public places to denote the open,
closed, and protected networks in range
War Chalking
Occurs when an attacker observes the operation of a cipher being used
with several different keys and finds a mathematical relationship
between those keys to determine the clear text data
IV Attack
Attack that targets an individual client connected to a network, forces it
offline by deauthenticating it, and then captures the handshake when it
reconnects
WiFi Disassociation Attack
Occurs when an attacker continually guesses a password until the correct
one is found
Brute Force Attack