Wireless Security Flashcards
Why is security even more important in wireless networks?
Since signals aren’t contained within a wire, any device within range of the signal can receive traffic
While in wired networks, traffic is generally only encrypted when sent over an untrusted network and not within the LAN, what is the case with wireless networks?
Traffic sent between wireless clients and APs should be encrypted as well
T/F: Ideally, clients should also authenticate the AP to avoid associating with a malicious AP
T
In addition to a unique encryption/decryption key used between the AP and each client, there is also a _____ for broadcast messages.
Group key
To help protect message integrity, a ______ is added to wireless messages
MIC
Message Integrity Check
How is a MIC used to ensure message integrity is preserved?
Sender calculates a MIC for a message. When recipient decrypts the message, it calculated the MIC independently. If the calculated MIC is not equal to the MIC included in the message, it is discarded
What are the most common wireless authentication methods?
- Open Authentication
- WEP (Wired Equivalent Privacy)
- EAP (Extensible Authentication Protocol)
- LEAP (Lightweight EAP)
- EAP-FAST (EAP Flexible Authentication via Secure Tunneling)
- PEAP (Protected EAP)
- EAP-TLS (EAP Transport Layer Security)
Describe the wireless authentication method Open Authentication
Client sends auth request, AP accepts it. No questions asked.
Often used in conjecture with another auth method, e.g. airline wifi
Describe the wireless authentication method WEP
Provided both authentication and RC4 encryption of traffic. Shared key protocol. Not secure and can be easily cracked. Don’t use.
AP sends challenge phrase using WEP key, client encrypts it and sends back. If decrypted client message matches, then AP knows client has correct shared key.
EAP and its different variations are all defined in IEEE ______
802.1x
IEEE 802.1x provides:
port-based network access control
In 802.1x, the device that wants to connect to the network is called the:
Supplicant
In 802.1x, the device that provides access to the network is called the:
Authenticator
In 802.1x, the device that receives client credentials and permits/denies access is called the:
Authentication Server
Typically a RADIUS server
In LEAP, clients must provide a _____ and a _____ to authenticate
username and password
In LEAP, both the client and the AP send a _____ to eachother
Challenge phrase.