Ch. 11 Security Administration Flashcards
Bluejacking
Unsolicited messages are sent to Bluetooth devices when in range
Bluesnarfing
Data is taken from a Bluetooth device
BYOD
Bring Your Own Device
COPE
Company-Owned and Provided Equipment
CYOD
Choose Your Own Device
EDGE
Enhanced Data Rates for GSM Evolution. This does not fit neatly into the 2G/3G/4G spectrum, Technically considered pre-3G, but an improvement on GSM (2G). Developed by ETSI and bridged 2G and 3G networks.
Evil Twin
Rogue wireless access point that mimics the SSID of a legitimate access point
GSM
Global System for Mobile communications. AKA 2G
LTE
Long Term Evolution - Standard for wireless communication of high-speed data for mobile devices. AKA 4G
UMTS
Universal Mobile Telecommunications Systems - 3G standard based on GSM.
802.11a
The first wireless standard - 5-GHz with a max data rate 54 Mbps
802.11b
2nd wireless standard - max data rate 11 Mbps
IEEE 802.11g
2.4 GHz frequency range - downward compatible with 802.11b devices with a max data reduced to 11 Mbps - Max throughput 54 Gbps
802.11n
Can operate at 5 GHz or 2.4 GHz. Compatible with a, b, and g but might not support MIMO technology
MIMO
Multiple In Multiple Out technology uses two or more streams of data transmission to increase data throughput
IEEE 802.11n-2009
Uses MIMO - Gets bandwidth of up to 600 Mbps - uses multiple antennas to resolve more information coherently than possible using a single antenna
802.11ax
Consists of 802.11ac, 802.11ad, 802.11af
802.11ac
Approved January 2014, Throughput of up to 1 Gbps with at least 500 Mbps. It uses up to 8 MIMO
802.11ad
This standard was developed by the Wireless Gigabyte Alliance . Supports data transmission rates up to 7 Gbps- more than 10 times faster than the highest 802.11n rate.
802.11af
AKA “White-Fi” and “Super Wi-Fi” was approved in February 2014. It allows WLAN operation in the TV White space spectrum in the VHF and UHF bands between 54 and 790 MHz.
Wired Equivalent Privacy (WEP)
Flawed, oldest wireless security
WPA WiFi Protected Access (WPA)
Uses Temporal Key Integrity Protocol (TKIP), 128 bit per packet key, dynamically generates a new key for each packet. Introduced with Windows XP Service Pack 1, it combined authentication with encryption.
WPA2
Based on IEEE 802.11i standard. Provides AES (Advanced Encryption Standard) using the Counter Mode-Cipher Block Chaining (CBC)- Message Authentication Code (MAC) Protocol (CCMP)
Three different methods of wireless security
- WEP
- WPA
- WPA2