T3 - Wireless networking Flashcards
Bluetooth
- is a wireless method of connecting devices together over a short distance
bluetooth
uses radio waves at 2.4 GHz
Pairing -
A persistent link is made between the two devices
passkey
in order to pair to it
- gives a layer of security like a password
Passkeys only need to be entered ..
once and will be remembered by devices that are paired
Wireless transmission
- uses radio waves for communication
Susceptible to interference
Wireless NICs
- Built into every networked device capable of connecting to a wireless network
Wireless Access Point (WAP) -
device
that allows wireless devices to connect to
a wired network using Wi-Fi
AP
usually connects to a router via a wired network
Encryption:
encoding of data so that it can no longer be easily understood
Plaintext
: the original message to be encrypted
Ciphertext:
the encrypted message
Encryption: the process of
converting plaintext into ciphertext
Key:
a sequence of numbers used to encrypt or decrypt, often data using a mathematical formula
Encryption algorithm:
the formula for encrypting the plaintext
Encryption techniques:
-private key
-public key
Private key
(Symmetric encryption):
A single key is used to encrypt and decrypt a message
must be given to the recipient of your message to decrypt the data
Public key
(Asymmetric encryption):
Two keys are used - one (public key) to encrypt and the other (private key) to decrypt data
more secure = never have to send or reveal your decryption key
Caesar shift cipher:
earliest known substitution cipher
symmetric encryption
-most basic type + the most insecure
- Letters of the alphabet are shifted by a given number
Caesar shift cipher: process
Each letter is replaced by a letter n positions further on in the alphabet
n is the key and is used to encrypt and decrypt the message
Symmetric encryption:
Same key used to encrypt and decrypt a message
Public key (Asymmetric) encryption:
Two keys are used: a public key known to everyone for encrypting and a private key for decrypting
Interception in wifi/ethernet
Wi-Fi signal can be listened to from a distance
Ethernet and fibre optic cables can also be intercepted
Wireless encryption: eg
Examples = WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access)
The WEP method of encryption is older and less secure
HTTPS should be used for websites as it encrypts data sent to and received from the site