SecurityTechniques Flashcards
Extended Server Set (ESS)
Configuration involves multiple wireless access points working together to create a unified and extended coverage area
Wireless Interference Types
Co-channel, Adjacent
Co-Channel
Is two on the same channel frequency
Adjacent
Is two or more different frequencies but the range collides
Site Survey
Process of planning and designing a wireless network to provide a solution
Heatmap
Graphical representation of the wireless coverage, signal strength, frequency utilization
Wired Equivalent Privacy (WEP)
Outdated 1999 wireless security standard meant to match LAN security for wireless network. They use the same encryption key for all devices on the network to secure messages
Wi-Fi Protected Access 2 (WPA2)
Improved data protection and network access control by addressing weaknesses in the WPA version; Use AES-CCMP to improve it
Wi-Fi Protected Access (WPA)
Created as a temporary improvement to WEP using TKIP protocol for a random key for each device instead of a fixed one
Wi-Fi Protected Access 3 (WPA3)
Latest version of WPA using AES, SAE, enhanced open, better protocols and management
Simultaneous Authentication of Equals (SAE)
Enhanced security by offering a key established protocol to guard against offline dictionary attacks
Enhanced Open/ Opportunistic Wireless Encryption (OWE)
Major advancement in wireless security, especially for networks using open authentication
AES CCMP was replaced from WAP2 to use __ in WPA3
AES-GCNP
Galoris Counter Protocol (GCNP)
Supports 128-bit AES for personal networks and 192-bit AES for enterprise networks with WPA3
Management Frame Protection
Required to Protect Networks from Key Recovery Attacks
WPA3 uses AAA techniques such as
Remote Authentication Dial-In User Service (RADIUS) for Client-Server Protocols and Terminal Access Controller Access-Control Plus (TACACS+) to allow separate control in the AAA types also using TCP
Application Security
Software development focused on building applications that are secure by design
Application Security Types
Input Validation, Secure Cookies, Static Code Analysis, Dynamic Code Analysis, Code Signing and Sandboxing
Static Code Analysis (SAST)
Method for debugging an application by reviewing and examining its source code before the program is ever ran
Dynamic Code Analysis Types
Fuzzing, Stress Testing
Fuzzing
Finding software flaws by bombarding it with random data to trigger crashes and security vulnerabilities
Code Signing
Used to confirm the identity of a software and integrity via digital signatures
Network Access Control
Scans devices for security status before granting network access, safeguarding against both known and unknown devices
Network access Control Types
Persistent / NonPersistent