day 8 Flashcards

1
Q

2G systems

A

GSM and CDMA

2G connections accounted for around 60 percent at the end of 2014

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2.5G

A

low-speed packet data delivery system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3g

A

high speed broadband packet system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3rd generation partnership project (3GPP)

A

LTE and LTE advanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3rd generation partnership project 2 (3GPP2)

A

IS-95 technologies commonly known as CDMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

GSM system

A

subscriber BTS

(BSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AIR interface (Um)

A

the air interface is a full-duplex link formed by two simplex radio channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Base Station Subsystem (BSS)

A

contains the BTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

spoof caller ID numbers

A

many cellular voicemail systems can be assessed using this technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A5 family of encryption algorithms

A
A5/0: no encryption
A5/1: first encryption
A5/2: weakened encryption
A5/3: replacement for A5/1
A5/4: A5/3 but with a 128-bit key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

more on A5/1

A

in 2009, 40 rainbow tables totalling two terabytes were published on the internet.

GSM voice calls and SMS/MMS messages can be decrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

International Mobile Subscriber Identity (IMSI)

A

a unique identifier to a mobile subscriber.

the IMSI is stored on the Subscriber Identity Module (SIM) card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

rogue BTS

A

because of the lack of mutual authenticaiton in GSM networks, a mobile device could be lured to connect to an attackers’ rogue BTS being run from a laptop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

femtocells

A

femtocells are small devices provided by mobile network operators that implement a complete GSM, CDMA, or LTE protocol stack

there have been at least two publicly known femtocell hacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Unlicensed Mobile Access (UMA)

A

UMA allows mobile carriers to use 802.11 networks to replace the UM Air interface to connect mobile devices to the Network Switching Subsystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WiFi calling attacks

A

an attacker operating in-line with the communicaitons flow, perhaps through use of ARP cache poisoning or operating as a rogue AP, could capture all information needed to be able to record all incoming/outgoing calls and texts

17
Q

Signalling System 7 (SS7)

A

a suite of telephony protocols developed in the mid-1970’s to set up and tear down most calls on the PSTN worldwide

18
Q

SS7 attacks

A

by injecting the appropriate SS7 messages, an attacker can perform call interception, reroute calling, intercept SMS messages, device location and tracking, commit financial fraud, or perform a denial of service

19
Q

4G LTE functionality

A

essentially all of the services-calling, data, control plane, messaging- are standardized onto a single unified backbone. That backbone is IPv4 and will soon be IPV6

20
Q

4G LTE security

A

earlier 3GPP systems were limited to a handful of algorithms, which could not be easily replaced without significant changes to the network infrastructure and mobile devices

21
Q

more on 4G LTE

A

to date, there have been no significant open source exploits in the over the air LTE network technology leading to eavesdropping or spoofing, allowing consumers to use this technology with some confidence