Security Techniques (Obj 4.1, 4.5) Flashcards

Page 299

1
Q

ESS (Extended Service Set)

A

Multiple WAPs work together to provide seamless network coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WEP (Wired Equivalent Privacy)

A
  • Introduced in 1999 as part of IEEE 802.11
  • Utilizes a static encryption key system
  • Considered insecure due to its weak 24-bit initialization vector
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WPA (Wi-Fi Protected Access)

A

Introduced in 2003 as an improvement over WEP
Implemented TKIP for dynamic key generation
Inherited some vulnerabilities from WEP
Due to TKIP vulnerabilities, it was susceptible to cryptographic attacks
Insecure due to insufficient data integrity checks in the TKIP implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WPA2 (Wi-Fi Protected Access 2)

A

Uses AES protocol and CCMP protocol for stronger encryption
– AES - Advanced Encryption Standard
– CCMP - Counter Cipher Mode with Block Chaining Message
Authentication Code
- Introduced Message Integrity Code (MIC) for integrity checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPA3 (Wi-Fi Protected Access 3)

A

Uses AES for encryption and introduces new features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WPA3 Features (page 303)

A

Simultaneous Authentication of Equals (SAE) - replaces the 4-way handshake with Diffie-Hellman
Enhanced Open (Opportunistic Wireless Encryption)
Updated Cryptographic Protocols - supports 128 and 192 bit AES and uses AEC GCMP
Management Frame Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication Protocols

A

EAP (Extensible Authentication Protocol) - authentication framework
PEAP (Protected Extensible Authentication Protocol) - encapsulates EAP within an encrypted TLS tunnel
EAP-TTLS (Extensible Authentication Protocol-Tunneled Transport Layer Security)
EAP-FAST (Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling) - Developed by Cisco systems for secure re-authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NAC (Network Access Control)

A

Used to protect networks from both known and unknown devices by scanning devices to assess their security status before granting network access
- Can be applied to devices within the internal network or those connecting remotely via VPN
- NAC can be implemented as a hardware or software solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

802.1x Standard

A

Port-based Network Access Control mechanism based on the IEEE 802.1x standard
- Modern NAC solutions build on 802.1x, enhancing features and capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ports Range

A

Well-known ports (0-1023)
Registered ports (1024-49151)
Dynamic/private ports (49152-65535)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly