wireless security Flashcards
war driving
People drive around looking for unsecured LANs so they can get free internet access
warchalking
once an open WLAN is found in a public place, a user writes a symbol on a wall to notify others
WEP & WPA security cracking
utilities can capture wireless packets and run mathematical algorithms to determine the pre-shared key
rouge access point
a malicious user set up his own AP to which legitimate users would connect
MAC address filtering
configures an AP with a listing of permitted MAC addresses. Unfortunately, it is possible for hackers to falsify their MAC address.
disabling SSID broadcast (aka cloaking)
configures the AP to not broadcast the name of the wireless LAN. Hackers can still find the SSID.
pre-shared key
both the AP & wireless client need the same key. can lead to scalability problems in large networks if the key is compromised
IEEE 802.1X
wired or wireless users authenticate with their own credentials.
WEP
Wired equivalent privacy. Original 802.11 wireless security standard. static 40-bit WEP key - AP & client use same key.
WPA
wi-fi protected access. Developed to address issues with WEP. Uses TKIP & MIC.
WPA2
uses counter mode with cipher block chaining message authentication code protocol (CCMP) & AES
TKIP
temporal key integrity protocol
MIC
message integrity check
SOHO security checklist
no default setting, virus protection/firewall/disable file sharing, cell sizing (adjust power setting to limit coverage where needed)
SOHO 2 security checklist
cloaking, MAC filter, static IP, encryption, turn off when not needed.