WiFi and Cloud Security Flashcards
What is WPA?
Wired Equivalent Privacy.
Used Rivest Cipher4(RC4) which had key size of 40 to 256 bits.
What did WPA have a problem with?
Forgeries
What was developed to strengthen WPA?
WEP: Wifi protected Access
TKIP: Temporal Key Integrity Protocol
What did WPA2 allow for the use of?
Stream Cipher (AES CCMP) for encryption so required dedicated hardware.
Why was TKIP used?
Backward compatibility by using a MIC.
MIC and Authentication allowed for the reduction of spoofing attacks.
What are the two modes of WPA2?
Personal
Enterprise
How does WPA2 Personal Work?
Uses a pre shared key and therefore doesn’t require separate user authentication.
How does WPA2 Enterprise work?
Uses EAP for authentication.
What is EAP?
Extensible Authentication Protocol.
Has multiple levels such as:
EAP-TLS,
EAP-TTLS (Tunneled TLS)
Protected EAP versions - some with token cards or an identity module.
How is WPA2 Personal authentication done?
Access Point generate a pre shared key from a plaintext password and shares it with the client.
How is WPA Enterprise authentcation done?
AP provides access control to the authentication server (RADIUS).
The AP has 2 logical ports, service and authentication (PAE).
Authentication port is always open and service is opened after successful authentication using EAPoL(EAP over LAN)
What is a PAE?
Port Access Entity
How does WPA2 KeyGen work?
2 sets of 2 handshakes to ensure fresh key generation and distribution.
4-Way handshake is for Pairwise Transient Key (PTK) and Group Transient Key (GTK).
How does the Four way handshake work for WPA2 KeyGen?
4 EAPoL messages sent between client and AP to confirm client knowns Pairwise Master Key.
PMK then is used to generate PTK which is fresh for each transaction
What are the vulnerabiltiies of WPA2?
Susceptible to DOS.
Deauthentication can happen by forcing the client to reauthenticate
Can spoof MAC Addresses
Disassociation when the client with multiple disassociate with some of them.
What is RFID?
Radio Frequency Identification.
Tags used to monitor the movement of goods.
What are the attacks that can occur on RFID tags?
Can be eavesdropped, spoofed or even DoS’d
What are some protections that can be put on RFID tags?
Can be shielded with Faraday Cages to prevent scanning.
Can be hashed for integrity
What are the security issues faced by cloud computing?
Many users, OS, Servers, Clients... Many transactions using VM's and Virtual networks Separation of VM, VN Storage Issues Services Level Agreements
What is cloud computing?
Non geolocation specific service made up of servers, VM’s and Virtual Networks providing rented applications and memory.
What are the service models of cloud computing?
Infrastructure as as Service (IaaS)
Software as a Service (SaaS)
Platform as a Service (PaaS)
What are different controls that should be put in place on cloud platforms?
Firewall and IDS AntiVirus Authentication Access Control Application/ Web Monitoring/ Response
Defence in Depth principle should be applied
What are the CSA’s top threats to cloud?
Data breaches Misconfiguration and poor change control Lack of security architecture and strategy Weak IAM Account Hijcaking Insider threats Insecure API's and Interfaces Weak control place
What are the required security steps for Cloud Platforms?
Reinforce internal security Demand transparency Consider legal and commercial implication Authentication Compliance Data segregation Disaster Recovery
What is virtualisation?
Core of the cloud, VMs and VNs are generated from different technologies to create hosts and networks on top of existing infrastructure
What is isolation?
Major technique for security, can contain all processing and traffic without it leaking onto physical system
What is a slice?
Can be created through a topology.
Isolated network ontop of existing infrastructure.
There can be many.
What were the findings of Ristenpart et. al?
Co-resident instances (Geographically close instances) had lowest RTTs.
Lag between launching of isntances
What are the implications of using ‘aaS’ models
One vulnerability or malware can be shared amongst user population and can increase with the size of the population.
What are the top risks when using cloud services?
Compliance Loss of Governance Cloud service termination/failure Cloud Provider Acquisition Isolation Failure CP insider threat...