Wireless Security Flashcards
What are cryptographic protocols-WEP?
Wired Equivalent Privacy is weak, uses a static key, 64 bit or 128 bit keys, uses RC4 stream cipher and CRC checksum
What is WPA?
What is WiFi protected access, it’s weak uses a temporal key integrity protocol per packet but still used RC4 stream cipher and a message integrity check
what is WPA2?
Is also known as 802.11i is alot stronger and uses CCMP which uses Advanced Encryption Standard with 128 bit key
What is WPA3?
It is the strongest and uses SAE and a 128bit key or 192bit key encryption
What authentication protocols fit in wireless security?
EAP/PEAP, EAP-FAST, EAP-TLS, EAP-TTLS
What is a pre-shared key
It is a password shared between users for authentication
Enterprise authentication method?
When the wireless client communicates with router then the raidus server and that sends a challenege that has to be answered by the user to get a connection
What is Wifi protected Setup?
Is security on the go it give you temporary pin to long into a network that has some security
What is a captive portal?
a authentication method where you log in through a web application with a password and username with a access code
installation considerations for wireless networks
Which means channel overlay meaning 2.4GHz has 11 channels and there are 3 the don’t overplap is 6,11,10 so it you have a next work is on channel 6 it could get congestion
installation consideration for wireless networks
Wireless access placement ususally in the ceiling
What are heatmaps and site surveys?
Just shows the coverage of your access points
Another installation considerations for wireless networks
Controllers and AP security