Wifi Security Flashcards
What is the Physical Layer?
Sending bits through a medium
What is the datalink layer?
Point-to-point communications between two devices
What is the MAC (medium access control) sub-layer?
Responsible for broadcasting. Moving packets from one node to another.
What is WEP (wired equivalent privacy)?
A security protocol used to secure wireless computer networks.
How does WEP work?
WEP operates by encrypting the data transmitted over the wireless network to protect from eavesdropping.
What is the encryption process of WEP?
The encryption process uses a shared key known as the WEP key to encode data.
What are the weakness of WEP?
Is can be easily cracked, due to the weak key generation.
What is the solution to WEP?
WPA (Wi-Fi Protected Access)
How does WPA encrypt information?
It uses a more robust encryption algorithm called TKIP, which dynamically generates keys for each data packet, making it more secure than keys used by WEP.
What key management does WPA use?
4 way handshake
How is WPA authentication compared to WEP?
WPA has a much strong authentication mechanism. It supports a variety of authentication methods.
What does WEP provide?
Authentication
Confidentiality
Integrity Checking
What does WEP not provide?
- Key management
- No protection against replay attacks
What is a replay attack?
When an attacker eavesdrops on a conversation, intercepts it and then delays or resends the message to misdirect the reciever
What are the approaches for WEP authentication?
- Open system authentication
- Shared key authentication
- Authentication using SSID of AP
- MAC address filtering