Wireless Security Flashcards

1
Q

Wireless encryption

A

• All wireless computers are radio transmitters
and receivers
• Anyone can listen in

  • Solution: Encrypt the data
  • Everyone gets the password
  • Or their own password

• Only people with the password can transmit and
listen
• WPA and WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WPA (Wi-Fi Protected Access)

A

• 2002: WPA was the replacement for serious
cryptographic weaknesses in WEP
• (Wired Equivalent Privacy)
• Don’t use WEP

• Needed a short-term bridge between WEP and
whatever would be the successor
• Run on existing hardware

• WPA: RC4 with TKIP (Temporal Key Integrity Protocol)
• Initialization Vector (IV) is larger and
an encrypted hash
• Every packet gets a unique 128-bit encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Temporal Key Integrity Protocol

A
  • Mixed the keys
  • Combines the secret root key with the IV
  • Adds a sequence counter
  • Prevents replay attacks
  • Implements a 64-bit Message Integrity Check
  • Protects against tampering
  • TKIP has it’s own set of vulnerabilities
  • Deprecated in the 802.11-2012 standard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WPA2 and CCMP

A
  • WPA2 certification began in 2004
  • AES (Advanced Encryption Standard) replaced RC4

• CCMP (Counter Mode with Cipher Block Chaining
Message Authentication Code Protocol) replaced TKIP
• CCMP block cipher mode
• Uses AES for data confidentiality
• 128-bit key and a 128-bit block size
• Requires additional computing resources

• CCMP security services
• Data confidentiality (AES), authentication,
and access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless security modes

A

• Configure the authentication on your wireless
access point / wireless router

  • Open System
  • No authentication password is required
  • WPA2-Personal / WPA2-PSK
  • WPA2 with a pre-shared key
  • Everyone uses the same 256-bit key

• WPA2-Enterprise / WPA2-802.1X
• Authenticates users individually with an
authentication server (i.e., RADIUS, TACACS+)
• Add additional factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RADIUS (Remote Authentication Dial-in User Service)

A

• One of the more common AAA protocols
• Supported on a wide variety of platforms and
devices
• Not just for dial-in

  • Centralize authentication for users
  • Routers, switches, firewalls
  • Server authentication
  • Remote VPN access
  • 802.1X network access

• RADIUS services available on almost any server operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TACACS

A
• Terminal Access Controller
 • Access-Control System
 • Remote authentication protocol
 • Created to control access to dial-up lines to 
    ARPANET
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TACACS+

A
  • The latest version of TACACS
  • More authentication requests and response codes
  • Released as an open standard in 1993
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the characteristic features of RADIUS?

A

Primarily used for network access

Combines authentication and authorization

Encrypts only the password in the access-request packe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristics of TACACS+?

A

Encrypts the entire payload of the access-request packet

Primarily used for device administration

Separates authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly