Security Operations: Examining Wireless Security Flashcards
Common Wireless Security Settings?
Common wireless security settings
The following are common settings that should be considered to help promote wireless security:
Changing defaults.
Apply strong encryption.
Require authentication.
Wireless security settings.
Disabling internet-based administration.
If applicable, implement:
Captive portal.
Media access control (MAC) filtering.
Disable Internet Control Message Protocol (ICMP).
What are the three important wireless security protocols?
Cryptographic protocols
Modes
Authentication protocols
What are the Cryptographic protocols include?
Cryptographic protocols include:
Wi-Fi Protected Access 2 (WPA2):
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol: Typically referred to as CCM mode Protocol (CCMP), it’s available in WPA2.
Current and widely adopted.
Shown to be vulnerable to a Key Reinstallation Attack (KRACK). However, vendors have released patches.
Wi-Fi Protected Access 3 (WPA3):
Strongest form of the WPA lineage currently.
Enforces minimum security levels at CCMP-128(AES-128 with CCM|) and a new Enterprise-192 mode.
Simultaneous Authentication of Equals allowing improved authentication.
Important: Wi-Fi Protected Access (WPA), Wired Equivalent Privacy (WEP), and Wi-Fi Protected Setup (WPS) should be avoided as these are considered compromised.
What modes are available in Wireless Router?
Modes
Modes include:
Personal Mode: Requires use of a preshared passphrase to authenticate devices on a Wi-Fi WPA2/3 network.
Enterprise Mode: Requires a centralized authentication server such as a RADIUS server and 802.1X capable network devices (WPA2/WPA3).
Enterprise 192-bit Mode: Increased size of the cryptographic keys used to secure communications (WPA3).
Authentication Protocols?
Authentication protocols
The main authentication protocols are preshared keys, which are a secret key or passphrase.
PSK
RADIUS
KERBEROS
EAP/PEAP
EAP/FAST
What is also critical when it comes to wireless security?
Plan your access points, use site surveys and heat maps.