Sec+ Chapter 13: Wireless and Mobile Security Flashcards

(42 cards)

1
Q

Connectivity modes

A

1) Cellular

2) Wi-Fi

3) Bluetooth

4) NFC

5) RFID

6) Infrared

7) GPS

8) USB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wi-Fi ad hoc mode

A

Allows devices to talk directly to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wi-Fi infrastructure mode

A

Sends traffic through a base station or access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SSID

A

Service set identifier

Identifies the name of a Wi-Fi network

SSIDs are either broadcast or private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Point to point network

A

Connects two nodes and transmissions between them can only be received by the endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Point to multipoint network

A

Wi-Fi, has many nodes receiving information sent by a node

Most common network we use today, like the one in our home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Broadcast network

A

Sends out information on many nodes and doesn’t care about receiving a response

EX: GPS and radio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evil twin

A

A malicious, fake access point that’s set up to appear to be a legit, trusted network

Once someone connects, attacker will capture all of the victim’s network traffic, present false versions of sites, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rogue access point

A

Access points added to your network either on purpose or unintentionally without your authorization

They offer a point of entry to attackers or other unwanted users

Defense: Monitor your network for added WAPs, range your physical perimeter to look, and use 802.1x to require anyone to authenticate, regardless of connection point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bluejacking

A

When an attacker sends unsolicited messages to Bluetooth enabled devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bluesnarfing

A

Unauthorized access to a Bluetooth device, typically aimed at gathering info from a device like contacts, emails, calendars, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BIAS

A

Bluetooth impersonation attacks

Exploits a lack of mutual authentication, authentication procedure downgrade options, and the ability to switch roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Disassociation

A

When a device disconnects from an access point

Attackers will try to force disassociation to set up more powerful evil twin or capture info as the system tries to reconnect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Jamming

A

Blocks all traffic in the range or frequency it’s conducted against

Attackers can send constant random bits or legit frames to disrupt the normal flow of communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Site survey

A

Physically walking through a facility or space to determine what existing networks are in place and where the physical structure is for access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

2.4 GHz channels

+

A

11 channels - 20 MHz wide - 5 MHz space between

1, 6, 11 commonly used to avoid overlap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How to secure access points?

A

1) Change default settings

2) Disable insecure protocols and services

3) Set stronger passwords

4) Protect admin interfaces with isolated VLAN

5) Regularly patch and update

6) Turn on monitoring and logging

18
Q

WPA Personal

A

WPA2 mode that uses preshared key that lets clients authenticate without an authentication server infrastructure

AKA: WPA-PSK (preshared key)

19
Q

WPA Enterprise

A

WPA2 mode that relies on RADIUS authentication server as part of an 802.1x implementation for authentication

Users have unique credentials and can be individually identified

20
Q

CCMP

A

Counter mode with cipher block chaining message authentication code protocol

Uses AES in WPA2 to deliver much stronger encryption than WEP and CBC-MAC for message integrity check (MIC)

21
Q

WPA3

A

Replacement for WPA2, required to be supported in all Wi-Fi devices since 2018

Changes encryption to GCMP (Galois counter moder protocol)

AES, but MIC uses GMAC (Galois message authentication code)

22
Q

SAE

A

Simultaneous authentication of equals

Used by WPA3 to replace shared keys in WPA2

A Diffie-Hellman derived key exchange with an authentication component

Everyone on the network uses a different session key, even with the same PSK

23
Q

WPA3 personal

A

Implements perfect forward secrecy, which ensures traffic sent between client and network is secure, even if password has been compromised

24
Q

Perfect forward secrecy

A

Changes encryption keys on an ongoing basis so a single exposed key won’t expose the entire communication

25
WPA3 enterprise
WPA3-802.1x Uses authentication server like RADIUS, LDAP, or TACACS to centralize everyone's username and password
26
3 types of Wi-Fi authentication
1) Open networks that use captive portals 2) Preshared keys (PSK), or the shared password 3) RADIUS server and EAP (extensible authentication protocol)
27
EAP
Extensible authentication protocol A general protocol that's used by 802.1x as part of the authentication process with a RADIUS server
28
PEAP
Protected extensible authentication protocol Uses TLS to send information, but instead of being based on a shared secret it's used with a digital cert Cert is only needed on the server in order to use PEAP If you're authenticating to Microsoft, this combines with MS-CHAPv2 (challenge handshake authentication protocol) PEAP can also be used with GTC (generic token card) or hardware token generator
29
EAP-FAST
Flexible authentication via secure tunneling extensible authentication protocol Make sure that authentication server (AS) and supplicant can transfer info between each other over a secure tunnel Accomplished with shared secret, or PAC (protected access credential) Supplicant receives PAC, sets up TLS tunnel, and then all authentication is encrypted in the tunnel
30
EAP-TLS
Extensible authentication protocol transport layer security Requires digital certs on authentication server (AS) and all devices Once mutual authentication is complete, TLS tunnel is built for the user authentication process because it uses mutual authentication Challenging because PKI is needed to manage, deploy, and revoke certs that may be in use in the environment Plus, older devices might not use digital certs which means they wouldn't be able to authenticate and connect with EAP-TLS
31
EAP TTLS
Extensible authentication protocol tunneled transport layer security Only requires a single digital cert on the AS, not separate digital certs for all devices You use the digital cert on AS to create and send info over the TLS tunnel Once the tunnel is up, you can send other authentication protocols across the tunnel: other EAPs, MSCHAPv2, etc
32
Mobile device deployment methods
1) BYOD: bring your own device 2) CYOD: choose your own device 3) COPE: corporate owned personally enabled 4) Corporate owned
33
VDI / VMI
Virtual desktop infrastructure / virtual mobile infrastructure You can separate both apps and data from the mobile device, storing the information somewhere else Access apps and data with remote access software
34
MDM
Mobile device management Targets Android and iOS devices
35
UEM
Unified endpoint management An evolution of MDM that allows us to easily manage security posture across multiple devices, use apps from different platform, and maintain security in all environments
36
MAM
Mobile application management Manage all the apps running on devices, when they're updated, what's allowed to be installed, how they're used, issues with apps, etc
37
microSD HSM
microSD hardware security module Virtually the same as other HSM, just micro
38
SEAndroid
Security enhancements for android SELinux (security enhanced) in the android OS Provides additional access control policies and policies for configuring security of the devices Prevents direct access to the kernel of the OS by protecting the privileged daemons Changes how data is accessed from DAC to MAC, which removes user from being able to control access someone has to the system and gives control to admin
39
WPA2 PSK
Preshared key with WPA2, security issue Subject to brute force attacks if someone has access to the pre-shared key Obtaining the hash can be done by listening in on the 4 way handshake when someone connects to WPA2 Once an attacker has the PSK, you have access to all data sent over the wireless comms (no forward secrecy)
40
802.1x
Port based NAC You don't get any access to wired or wireless network unless you present the proper credentials using 802.1x Used in conjunction with access databases RADIUS, TACACS, LDAP
41
RADIUS Federaton
Federation is when you link a user's identity across multiple authentication systems Commonly used if you're at a third party location and want to authenticate using credentials created for another location RADIUS federation uses 802.1x as authentication method, so you use EAP to authenticate and often to a RADIUS server on the back end
42
MCM
Mobile content management How you secure the data on a mobile device and ensure its safety Set policies based on where the data is stored, like on site or in the cloud DLP on the mobile device can prevent the sending of sensitive data, and encryption ensures sensitive data is securely encrypted