Wireless Security (obj 2.3) Flashcards
(23 cards)
What are the security risks associated with wireless networks?
Easy access within signal range
Wireless networks offer convenience but can be easily accessed by unauthorized users within range.
What is crucial for network security in wireless networks?
Proper authentication and encryption
These elements help protect against unauthorized access and data breaches.
What does Pre-Shared Key (PSK) authentication involve?
A shared key between access point and client devices, typically a string of characters
PSK is often used in personal networks but has limitations.
What are the challenges associated with Pre-Shared Key (PSK)?
- Scalability issues in large environments
- Lack of individual user accountability
- Not practical for large office settings due to shared key usage
These challenges limit the effectiveness of PSK in enterprise environments.
What is Enterprise Authentication?
Utilizes individual user credentials managed by an authentication server (e.g., RADIUS)
This method enhances security by authenticating users individually.
What is the 802.1X Authentication System?
Most widely-used enterprise-grade authentication method
It relies on an authentication server like RADIUS for managing user credentials.
What does Wired Equivalent Privacy (WEP) rely on?
A pre-shared key
WEP was the original wireless security standard but is now considered insecure.
What are the key vulnerabilities of WEP?
- Weak encryption
- Vulnerability to reverse engineering
- Initialization Vector (IV) weaknesses
WEP’s reliance on weak encryption makes it easily crackable.
What is the purpose of the Initialization Vector (IV) in WEP?
A 24-bit sent in plain text
The IV is a significant vulnerability that allows attackers to crack WEP encryption.
What is Wi-Fi Protected Access (WPA)?
Developed as a replacement for WEP to address IV vulnerabilities
WPA introduced improved security features over WEP.
What is Temporal Key Integrity Protocol (TKIP)?
A new type of vector that uses a longer 48-bit vector compared to WEP’s IV
TKIP enhances security by addressing WEP’s weaknesses.
What does the Message Integrity Check (MIC) in WPA do?
Prevents On-path attacks by verifying data integrity during transfer
MIC hashes data before transmission to ensure it remains unchanged.
What is Wi-Fi Protected Access 2 (WPA2)?
Replaced WPA due to vulnerabilities, introduced in 2004 as part of the 802.11i standard
WPA2 offers stronger integrity checking and better encryption.
What encryption protocol does WPA2 use?
Countermode with Cipher Blockchaining Message Authentication Code Protocol (CCMP)
CCMP combines message integrity checks with encryption for enhanced security.
What encryption algorithm does WPA2 replace?
Replaces the less secure RC4 encryption algorithm
WPA2 uses Advanced Encryption Standard (AES) for better security.
What are the modes of WPA2?
- Personal mode
- Enterprise mode
Personal mode uses a pre-shared key, while enterprise mode utilizes centralized authentication.
What is Wi-Fi Protected Access 3 (WPA3)?
Introduced in 2018, improves upon WPA2 with enhanced features
WPA3 offers better security protocols and mechanisms.
What is the Simultaneous Authentication of Equals (SAE) in WPA3?
A security protocol designed to enhance the handshake process used in Wi-Fi authentication
SAE replaces pre-shared key methods with a more secure mechanism.
What is a key vulnerability of Wi-Fi Protected Setup (WPS)?
Vulnerable to brute force attacks due to PIN vulnerability
It is recommended to disable WPS for better security.
Fill in the blank: WEP relies on a _______.
pre-shared key
Fill in the blank: WPA2 uses _______ for integrity and _______ for encryption.
CCMP; AES
True or False: WPA3 introduces the Dragonfly key exchange.
True
What are the key tips for exam preparation regarding wireless security?
- Open networks – no security measures
- WEP – Initialization Vector (IV) vulnerabilities
- WPA – linked with TKIP and RC4 encryption
- WPA2 – uses CCMP for integrity and AES for encryption
- WPA3 – introduces SAE and Dragonfly key exchange
- WPS – involves push-button configuration but should be disabled for security
These tips summarize crucial aspects of wireless security standards.