Security Plus - Chapter 13 Flashcards
Cellular Network
Provide connectivity for mobile devices like cell phones by dividing geographic areas into “cells” with tower coverage allowing wireless communications between devices and towers or cell sites.
LTE (Long-term evolution), 4G, & 5G. 5G requires more densely populated antenna distribution but provides significantly more speed. Connections are provided by a cellular carrier, which is secured, managed, and controlled outside of your organization, and traffic sent via cellular connection goes through a third-party network.
Wi-Fi Network
A range of wireless protocols that are used to provide wireless networking. Relies on 2.4 GHz and 5 GHz radio bands and uses multiple channels within those bands to allow multiple networks to coexist.
Standard Wi-Fi ranges (slowest to fastest):
- 802.11b - 11mbits 2.4 GHz
- 802.11n - 54 mbits 5 GHz
- 802.11g - 54 mbits 2.4 GHz
- 802.11ac - 600 mbits 5 GHz
- 802.11ax - 6.9 gbits 2.4, 5, or 6 GHz
- 802.11be - 40+ gbits 2.4, 5, or 6 GHz
Other Wireless Network Information
WPA2
WPA3
Ad hoc mode - Allows devices to talk with each other directly
Infrastructure mode - Sends traffic through a base station or access point.
Service Set Identifiers (SSIDs) - Identify the wireless network name. Can be set to broadcast or private.
Bluetooth
Operates on 2.4 GHz range, for low-power, short range (usually 30 - 50 meters) connections that do not have very high bandwidth needs.
Bluetooth Security Modes
Security Mode 1 - No security unsecure
Security Mode 2 - Service-level enforced security
Security Mode 3 - Link-level enforced security
Security Mode 4 - Standard pairing with Security Simple Pairing
Bluetooth does not support encryption. Fixed PINs reduce the security of the connection. Susceptible to eavesdropping as well.
Radio Frequency Identification (RFID)
A relatively short range (less than a foot (passive) to 100 meters (active)) wireless technology that uses a tag and receiver to exchange information.
Active has their own power source and always send signals to be read by a reader, semi-active have a battery but are activated by a reader, passive tags are always powered by a reader.
Frequency ranges:
Low - Short range, low-power for entry access and identification purposes, where they are scanned by a nearby reader.
High - Have a longer readable range up to a meter and communicate more quickly. Used for near-field communication, can support read-only, write-only and rewritable tags.
Ultra-high - The fastest to read with the longest range. Used in circumstances where readers are far away. Inventory management and antitheft purposes so a tag can be read from meters away.
Global Positioning System (GPS)
Uses a constellation of satellites that send out signals which are received by a compatible GPS receiver. Can be as accurate as to identify a GPS device to within a foot of their location. This allows for highly accurate placement for geofencing, and other GPS uses. Provides a consistent time signal as well.
Attacks:
Can be jammed or spoofed
Near-Field Communication (NFC) Not on exam
Short-range communication between devices, like payment terminals. Less than 4 inches of range. Attacks have to come from other devices within close proximity.
Infrared (Not on exam)
Wireless technology that works in line-of-sight opportunities. Wide range of speeds. from 115 kbits to 1 gbits. Television remote controls.
Wireless Connection Models
Point-to-Point - Connects two nodes, and transmissions between them can only be received by the endpoints.
Point-to-Multipoint - Connects multiple devices from a single location. Ex. Wi-Fi
Broadcast - Sends out information on many nodes and are received by many nodes. Ex. GPS and radio
Attacks against Wireless Network and Devices
Evil Twin - A malicious illegitimate access point that is setup to appear to be a legitimate trusted network.
Rogue Access Points
Access points that are added to your network either intentionally or unintentionally. Once connected, they offer a point of entry to attackers or other unwanted users.
Bluetooth Attacks
Bluejacking - Sends unsolicited messages to Bluetooth-enabled devices.
Bluesnarfing - Unauthorized access to a Bluetooth device, typically aimed at gathering information like contact lists or other details of or on the device.
Bluetooth impersonation attacks - Take advantage of weaknesses in the Bluetooth specification, meaning that all devices that implement Bluetooth as expected are likely to be vulnerable to them. They exploit a lack of mutual authentication.
Disassociation Attack
When a threat causes a device to disconnect from an access point. This causes the system to attempt to reconnect, providing the attacker with a window of opportunity to setup a more powerful evil twin or capture information as the system tries to reconnect.
Attackers may send a deauthentication frame, a specific wireless protocol element that spoofs the victim’s wireless MAC address.
Jamming Attack
Blocks all traffic in the range or frequency it is conducted against.