Security Operations: Examining Wireless Security Flashcards

1
Q

Common Wireless Security Settings?

A

Common wireless security settings

The following are common settings that should be considered to help promote wireless security:

Changing defaults.

Apply strong encryption.

Require authentication.

Wireless security settings.

Disabling internet-based administration.

If applicable, implement:

Captive portal.

Media access control (MAC) filtering.

Disable Internet Control Message Protocol (ICMP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three important wireless security protocols?

A

Cryptographic protocols

Modes

Authentication protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the Cryptographic protocols include?

A

Cryptographic protocols include:

Wi-Fi Protected Access 2 (WPA2):

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol: Typically referred to as CCM mode Protocol (CCMP), it’s available in WPA2.

Current and widely adopted.

Shown to be vulnerable to a Key Reinstallation Attack (KRACK). However, vendors have released patches.

Wi-Fi Protected Access 3 (WPA3):

Strongest form of the WPA lineage currently.

Enforces minimum security levels at CCMP-128(AES-128 with CCM|) and a new Enterprise-192 mode.

Simultaneous Authentication of Equals allowing improved authentication.

Important: Wi-Fi Protected Access (WPA), Wired Equivalent Privacy (WEP), and Wi-Fi Protected Setup (WPS) should be avoided as these are considered compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What modes are available in Wireless Router?

A

Modes

Modes include:

Personal Mode: Requires use of a preshared passphrase to authenticate devices on a Wi-Fi WPA2/3 network.

Enterprise Mode: Requires a centralized authentication server such as a RADIUS server and 802.1X capable network devices (WPA2/WPA3).

Enterprise 192-bit Mode: Increased size of the cryptographic keys used to secure communications (WPA3).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication Protocols?

A

Authentication protocols

The main authentication protocols are preshared keys, which are a secret key or passphrase.

PSK
RADIUS
KERBEROS
EAP/PEAP
EAP/FAST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is also critical when it comes to wireless security?

A

Plan your access points, use site surveys and heat maps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly