Chapter 8 - Wireless Network Security Flashcards
Bluetooth
A wireless technology that uses short-range radio frequency (RF) transmissions and provides rapid ad hoc device pairings.
Ad hoc topology
A configuration in which networks can be created “on the fly” as needed.
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluesnarfing
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection.
Near field communication (NFC)
A set of standards used to establish communication between devices in very close proximity.
Radio frequency identification (RFID)
A wireless set of standards used to transmit information from paper-based tags to a proximity reader.
Wireless local area network (WLAN)
A wireless network designed to replace or supplement a wired local area network (LAN). Commonly called Wi-Fi.
Access point (AP)
A centrally located WLAN connection device that can send and receive information.
Ad hoc mode
A WLAN functioning without an AP.
Rogue AP
An unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
Evil twin
An AP set up by an attacker to mimic an authorized AP and capture transmissions, so a users device will unknowingly connect to this evil twin instead of the authorized AP.
Wireless replay attack
A passive attack in which the attacker captures transmitted wireless data, records it, and then sends it on to the original recipient without the attackers presence being detected.
Jamming
Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal “noise” that creates interference and prevents communications from occurring.
Disassociation attack
A wireless attack in which false de-authentication or disassociation frames are sent to an AP that appear to come from another client device, causing the client to disconnect.
Wi-Fi protected setup (WPS)
An optional means of configuring security on wireless local area networks primarily intended to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs. Due to design and implementation flaws, WPS is not considered secure.
Wired Equivalent Privacy (WEP)
An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP accomplishes this confidentiality by encrypting the transmissions.
Media access control (MAC) address filtering
A method for controlling access to a WLAN based on the devices MAC address.
Service Set Identifier (SSID)
The alphanumeric user-supplied network name of a WLAN.
Wi-Fi protected access (WPA)
The original set of protections from the Wi-Fi Alliance designed to address both encryption and authentication.
Temporal Key Integrity Protocol (TKIP)
The WPA and WPA2 encryption technology.
Open method
A wireless network mode in which no authentication is required.
Preshared key (PSK)
The authentication model used in WPA that requires a secret key value to be entered in the AP and all approved wireless devices prior to communicating.
Wi-Fi Protected Access 2 (WPA2)
The second generation of WPA security from the Wi-Fi Alliance that addresses authentication and encryption on WLANs and is currently the most secure model for Wi-Fi security.
Counter mode with cipher block chaining message authentication code protocol (CCMP)
The encryption protocol used for WPA2 that specifies the use of a general-purpose cipher mode algorithm providing data privacy with AES.