Lecture 2a Flashcards
(44 cards)
What technology does Bluetooth use for communication?
Short-range radio frequency RF transmissions
What is the primary Bluetooth network topology called?
Piconet
In Bluetooth
who controls all wireless traffic in a piconet?
What is Bluejacking?
An attack sending unwanted messages to Bluetooth-enabled devices
Is Bluejacking harmful or annoying?
More annoying than harmful because no data is stolen
What is Bluesnarfing?
An attack accessing unauthorized information from a Bluetooth device
What happens during Bluesnarfing?
Attacker copies emails contacts or other data without owner knowing
What is Near Field Communication NFC?
A set of standards for communication between devices in close proximity
At what distance do NFC devices establish communication?
Within 4 centimeters or by tapping
What is a passive NFC device?
Contains information that can be read but does not transmit data
What is an active NFC device?
Can read and transmit information
Name three examples of NFC use.
Automobile Entertainment Retail stores
What is RFID commonly used for?
Transmitting information between badges inventory tags and other proximity tags
Do RFID tags require their own power supply?
No most RFID tags are passive and do not have a power supply
Name one RFID attack type.
Unauthorized tag access
What can happen in an unauthorized tag access attack?
Rogue reader determines inventory on store shelf
What is a fake tag attack in RFID?
Replacing authentic tags with fake ones containing false data
What can eavesdropping on RFID communications lead to?
Leak of confidential data like purchase history to rivals
What is a WLAN?
A wireless local area network designed to replace or supplement wired LAN
What organization sets WLAN standards?
Institute of Electrical and Electronics Engineers IEEE
When was the IEEE 802.11 standard first released?
1997
What Wi-Fi version corresponds to IEEE 802.11n?
Wi-Fi 4
What device acts as a base station and bridge in a WLAN?
Access Point AP