Wireless Network Security Flashcards

1
Q

Introduction to WiFI

A

No inherent physical protection

Broadcast communications

Security threats:
Eavesdropping
Injecting bogus messages
Replaying previously recorded messages
Illegitimate access to the network & its services
Denial-of-service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key factors contributing to higher security risk of wireless networks

A

Channel
broadcast communications more susceptible to eavesdropping and jamming

Mobility
wireless devices portable, so more risks

Resources
wireless devices have sophisticated OS but limited memory and processing resources to counter threats (DOS and malware)

Accessibility
wireless devices like sensors and robots may be left unattended in remote or hostile locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security threats to wireless networks

A

Accidental association

Malicious assocaition

Ad hoc networks

Nontraditional networks

Identity theft (MAC spoofing)

Man in the middle attacks

Denial of Service attacks

Network injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Securing wireless transmissions

A

Signal hiding techniques

  • -turn off SSID broadcasting
  • -encrypt SSID
  • -reduce signal strength
  • -locate wireless access points in interior of building

Encryption
–encrypt all wireless transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Securing wireless networks

A

Use encryption

use antivirus and antispyware software and a firewall

turn off identifier broadcasting

change identifier on router from default

change router’s pre set password for administration

allow only specific computers access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mobile device security concerns

A

Lack of physical security controls

Use of untrusted mobile devices

Use of untrusted networks

Use of applications created by unknown parties

Interaction with other systems

Use of untrusted content

Use of location services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mobile device security controls

A

Enable auto-lock

Enable password or PIN protection

Avoid use of autocomplete

Enable remote wipe

Ensure that SSL protection is enabled

Make sure that software, including operating systems and applications, is up to date

Install antivirus software

Prohibit sensitive data or encrypt it

IT ability to remotely access devices to wipe or disable

Prohibit installation of third-party applications

Restrictions on what devices can sync and use cloud

Train personnel on risks

Disable location services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access point

A

any entity that has station functionality and provides access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Basic service set

A

set of stations controlled by single coordination function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Coordination function

A

logical function that determines when a station operating within a BSS is permitted to transmit and may be able to receive PDUs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Distribution System

A

System used to interconnect a set of BSSs and integrated LANS to create an ESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Extended Service Set

A

set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of the BSSs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAC protocol data unit

A

unit of data exchanged between two peer MAC entities using the services of the physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAC service data unit

A

Information delivered as a unit between MAC users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Station

A

any device that contains an IEEE 802.11 conformant MAC and physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IEEE 802 protocol architecture

A

Physical Layer

Medium Access Control layer

Logical Link Control layer

17
Q

Physical Layer

A

Functions:
encoding/decoding of signals

bit transmission/reception

transmission medium

frequency band definition

wireless signal encoding

18
Q

Medium Access Control Layer

A
Functions:
assemble data into frame
Addressing
Error detection
Medium Access

Reliabl edata delivery

Wireless access control protocols

19
Q

Logical Link Layer

A

Functions:
flow control
error control

20
Q

MAC Control frame fields

A

MAC Control
-protocol control info

Destination MAC Address
-the destination physical address on the LAN for this MPDU

Source MAC address
-source physical address on the LAN for this MPDU

MAC Service Data Unit
-data from next higher layer

CRC
-cyclic redundancy check field, Frame Check Sequence field

21
Q

DS transition types

A

No transition
-station is stationary or moves only within direct communication range of communicating stations of single BSS

BSS transition
-station movement from one BSS to another

ESS transition
-station movemoent from a BSS in one ESS to a BSS in another ESS

22
Q

Services related to requirement that station must maintain association with AP within current BSS

A

Association
-establishes initial association between station and AP

Reassociation

Disassociation

23
Q

WEP

A

Earlier WiFI security solution

shown to be easily breakable even when correctly configured.

24
Q

WPA

A

Replaced WEP

25
Q

WPA2 services

A

(802.11i newest standard)

Authentication

Access Control

Privacy with message integrity

26
Q

WPA2 Main advantages over WEP

A

access control model is based on 802.1X
flexible authentication framework (based on EAP Extensible Authentication Protocol)
-Carrier protocol designed to transport the messages of real authentication protocols (e.g., TLS – Transport Layer Security)

authentication process results in a shared session key (which prevents session hijacking)

different functions (encryption, integrity) use different keys derived from the session key using a one-way function

integrity protection is improved

encryption function is improved

27
Q

802.11i five phases of operation

A

Discovery

Authentication

Key Management

Protected data transfer

Connection termination

28
Q

Pairwise Keys

A

Preshared key (PSK) or Master Session Key (MSK)

Pairwise master key (PMK) derived from master key

Pairwise transient key (PTK) consists of three keys provides protection against session hijaking and impersonation

29
Q

Group Keys

A

used for multicast communication in which one STA sends MPDUs to multiple STAs