Wireless Networks 2.3 Flashcards
Modulates data over an entire range of frequencies using a series of signals known as chips
Direct Sequence Spread Spectrum (DSSS)
Allows devices to hop between predetermined frequencies
Frequency Hopping Spread Spectrum (FHSS)
Uses a slow modulation rate with simultaneous transmissions over 52 different data streams
Orthogonal Frequency Division Multiplexing (OFDM)
A virtual medium through which wireless networks can send and receive data
Channel
what are the channels to avoid overlapping frequencies in the 2.4 GHz band
1,6, & 11
Allows for the creation of a wider channel by merging neighboring channels into one
Channel Bonding
802.11_ - band 5GHz and Bandwidth 54Mbps
802.11a
802.11_ - band 2.4GHz and Bandwidth 11Mbps
802.11b
802.11_ - band 2.4GHz and Bandwidth 54Mbps
802.11g
802.11_ - band 2.4GHz and 5GHz and Bandwidth 150 Mbps/600Mbps (MIMO)
802.11n (Wi-Fi 4)
802.11_ - band 5 GHz and Bandwidth 3 Gbps
802.11ac (Wi-Fi 5)
802.11_ - band 2.4, 5, and 6 GHz and Bandwidth 9.6 Gbps
802.11ax (Wi-Fi 6)
Uses multiple antennas to send and receive data than it could with a single antenna
Multiple-Input and Multiple-Output (MIMO)
Allows multiple users to access the wireless network and access point at the same time
Multiple User Multiple Input Multiple Output (MU-MIMO)
Occurs when there are similar frequencies to wireless networks in the area
Radio Frequency Interference (RFI)
Both the access point and the client use the same encryption key
Pre-shared Key
Original 802.11 wireless security standard which is an insecure security protocol
IV
Wired Equivalent Privacy (WEP)
Replaced WEP and follows the Temporal Key Integrity Protocol
TKIP and RC4
Wi-Fi Protected Access (WPA)
For Encryption
Rivest Cipher (RC4)
To confirm data was not modified in transit
Message Integrity Check (MIC)
To authenticate users before exchanging keys
Enterprise Mode
To provide additional security by using a 128-bit key or higher
Advanced Encryption Standard (AES)
Requires stronger encryption and integrity checking through
CCMP & AES
Wi-Fi Protected Access 2 (WPA2)
Pre-shared key
Personal mode
Authentication
Enterprise Mode
Configures an access point with a listing of permitting MAC addresses
MAC address Filtering
Configures an access point not to broadcast the name of the wireless LAN
Disabling SSID Broadcast
Creates point to point connections from one building to another over short distance
Wifi (802.11)
Uses a larger antenna and a larger hots pot powered by a power outlet within an office or home
Cellular
a long range and fixed wireless solution that can go for miles
Satellite
Creates point to point connection between 2 or more buildings that cover 40 miles
Microwave
Requires more satellites to cover the entire planet but gives lower latency speeds
Low Earth Orbit
One satellite can cover a large portion of the Earth
higher latency and lower quality
Geosynchronous Orbit
Uses radio frequency to send electromagnetic charge containing the transaction data a short distance
Near Field Communication (NFC)
A from of radio frequency transmission modified for use in authentication systems
Radio Frequency dentification (RFID)
Allows 2 devices to communicate using line of sight communication in the infrared spectrum
Infrared Data (IrDA)
Creates a personal area network over 2.4 GHz to allow for wireless connectivity
Bluetooth
Sending unsolicited messages to a Bluetooth device
Bluejacking
Making unauthorized access to a device via Bluetooth connection
Bluesnarfing
Allows the attacker to gain complete control over a device without even being connected to the target device
BlueBorne
Sharing cellular data internet connection from a smartphone to multiple other devices
Tethering