WiFi and Cloud Security Flashcards

1
Q

What is WPA?

A

Wired Equivalent Privacy.

Used Rivest Cipher4(RC4) which had key size of 40 to 256 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What did WPA have a problem with?

A

Forgeries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What was developed to strengthen WPA?

A

WEP: Wifi protected Access
TKIP: Temporal Key Integrity Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What did WPA2 allow for the use of?

A

Stream Cipher (AES CCMP) for encryption so required dedicated hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why was TKIP used?

A

Backward compatibility by using a MIC.

MIC and Authentication allowed for the reduction of spoofing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two modes of WPA2?

A

Personal

Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does WPA2 Personal Work?

A

Uses a pre shared key and therefore doesn’t require separate user authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does WPA2 Enterprise work?

A

Uses EAP for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is EAP?

A

Extensible Authentication Protocol.

Has multiple levels such as:
EAP-TLS,
EAP-TTLS (Tunneled TLS)
Protected EAP versions - some with token cards or an identity module.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is WPA2 Personal authentication done?

A

Access Point generate a pre shared key from a plaintext password and shares it with the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is WPA Enterprise authentcation done?

A

AP provides access control to the authentication server (RADIUS).

The AP has 2 logical ports, service and authentication (PAE).

Authentication port is always open and service is opened after successful authentication using EAPoL(EAP over LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a PAE?

A

Port Access Entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does WPA2 KeyGen work?

A

2 sets of 2 handshakes to ensure fresh key generation and distribution.

4-Way handshake is for Pairwise Transient Key (PTK) and Group Transient Key (GTK).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does the Four way handshake work for WPA2 KeyGen?

A

4 EAPoL messages sent between client and AP to confirm client knowns Pairwise Master Key.

PMK then is used to generate PTK which is fresh for each transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the vulnerabiltiies of WPA2?

A

Susceptible to DOS.

Deauthentication can happen by forcing the client to reauthenticate

Can spoof MAC Addresses

Disassociation when the client with multiple disassociate with some of them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is RFID?

A

Radio Frequency Identification.

Tags used to monitor the movement of goods.

17
Q

What are the attacks that can occur on RFID tags?

A

Can be eavesdropped, spoofed or even DoS’d

18
Q

What are some protections that can be put on RFID tags?

A

Can be shielded with Faraday Cages to prevent scanning.

Can be hashed for integrity

19
Q

What are the security issues faced by cloud computing?

A
Many users, OS, Servers, Clients...
Many transactions using VM's and Virtual networks
Separation of VM, VN
Storage Issues
Services Level Agreements
20
Q

What is cloud computing?

A

Non geolocation specific service made up of servers, VM’s and Virtual Networks providing rented applications and memory.

21
Q

What are the service models of cloud computing?

A

Infrastructure as as Service (IaaS)

Software as a Service (SaaS)

Platform as a Service (PaaS)

22
Q

What are different controls that should be put in place on cloud platforms?

A
Firewall and IDS
AntiVirus
Authentication
Access Control
Application/ Web
Monitoring/ Response

Defence in Depth principle should be applied

23
Q

What are the CSA’s top threats to cloud?

A
Data breaches
Misconfiguration and poor change control
Lack of security architecture and strategy
Weak IAM
Account Hijcaking
Insider threats
Insecure API's and Interfaces
Weak control place
24
Q

What are the required security steps for Cloud Platforms?

A
Reinforce internal security
Demand transparency
Consider legal and commercial implication
Authentication
Compliance
Data segregation
Disaster Recovery
25
Q

What is virtualisation?

A

Core of the cloud, VMs and VNs are generated from different technologies to create hosts and networks on top of existing infrastructure

26
Q

What is isolation?

A

Major technique for security, can contain all processing and traffic without it leaking onto physical system

27
Q

What is a slice?

A

Can be created through a topology.

Isolated network ontop of existing infrastructure.

There can be many.

28
Q

What were the findings of Ristenpart et. al?

A

Co-resident instances (Geographically close instances) had lowest RTTs.

Lag between launching of isntances

29
Q

What are the implications of using ‘aaS’ models

A

One vulnerability or malware can be shared amongst user population and can increase with the size of the population.

30
Q

What are the top risks when using cloud services?

A
Compliance
Loss of Governance
Cloud service termination/failure
Cloud Provider Acquisition
Isolation Failure
CP insider threat...