Wireless Security (obj 2.3) Flashcards

(23 cards)

1
Q

What are the security risks associated with wireless networks?

A

Easy access within signal range

Wireless networks offer convenience but can be easily accessed by unauthorized users within range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is crucial for network security in wireless networks?

A

Proper authentication and encryption

These elements help protect against unauthorized access and data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Pre-Shared Key (PSK) authentication involve?

A

A shared key between access point and client devices, typically a string of characters

PSK is often used in personal networks but has limitations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the challenges associated with Pre-Shared Key (PSK)?

A
  • Scalability issues in large environments
  • Lack of individual user accountability
  • Not practical for large office settings due to shared key usage

These challenges limit the effectiveness of PSK in enterprise environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Enterprise Authentication?

A

Utilizes individual user credentials managed by an authentication server (e.g., RADIUS)

This method enhances security by authenticating users individually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the 802.1X Authentication System?

A

Most widely-used enterprise-grade authentication method

It relies on an authentication server like RADIUS for managing user credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Wired Equivalent Privacy (WEP) rely on?

A

A pre-shared key

WEP was the original wireless security standard but is now considered insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the key vulnerabilities of WEP?

A
  • Weak encryption
  • Vulnerability to reverse engineering
  • Initialization Vector (IV) weaknesses

WEP’s reliance on weak encryption makes it easily crackable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of the Initialization Vector (IV) in WEP?

A

A 24-bit sent in plain text

The IV is a significant vulnerability that allows attackers to crack WEP encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Wi-Fi Protected Access (WPA)?

A

Developed as a replacement for WEP to address IV vulnerabilities

WPA introduced improved security features over WEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Temporal Key Integrity Protocol (TKIP)?

A

A new type of vector that uses a longer 48-bit vector compared to WEP’s IV

TKIP enhances security by addressing WEP’s weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the Message Integrity Check (MIC) in WPA do?

A

Prevents On-path attacks by verifying data integrity during transfer

MIC hashes data before transmission to ensure it remains unchanged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Wi-Fi Protected Access 2 (WPA2)?

A

Replaced WPA due to vulnerabilities, introduced in 2004 as part of the 802.11i standard

WPA2 offers stronger integrity checking and better encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What encryption protocol does WPA2 use?

A

Countermode with Cipher Blockchaining Message Authentication Code Protocol (CCMP)

CCMP combines message integrity checks with encryption for enhanced security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What encryption algorithm does WPA2 replace?

A

Replaces the less secure RC4 encryption algorithm

WPA2 uses Advanced Encryption Standard (AES) for better security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the modes of WPA2?

A
  • Personal mode
  • Enterprise mode

Personal mode uses a pre-shared key, while enterprise mode utilizes centralized authentication.

17
Q

What is Wi-Fi Protected Access 3 (WPA3)?

A

Introduced in 2018, improves upon WPA2 with enhanced features

WPA3 offers better security protocols and mechanisms.

18
Q

What is the Simultaneous Authentication of Equals (SAE) in WPA3?

A

A security protocol designed to enhance the handshake process used in Wi-Fi authentication

SAE replaces pre-shared key methods with a more secure mechanism.

19
Q

What is a key vulnerability of Wi-Fi Protected Setup (WPS)?

A

Vulnerable to brute force attacks due to PIN vulnerability

It is recommended to disable WPS for better security.

20
Q

Fill in the blank: WEP relies on a _______.

A

pre-shared key

21
Q

Fill in the blank: WPA2 uses _______ for integrity and _______ for encryption.

22
Q

True or False: WPA3 introduces the Dragonfly key exchange.

23
Q

What are the key tips for exam preparation regarding wireless security?

A
  • Open networks – no security measures
  • WEP – Initialization Vector (IV) vulnerabilities
  • WPA – linked with TKIP and RC4 encryption
  • WPA2 – uses CCMP for integrity and AES for encryption
  • WPA3 – introduces SAE and Dragonfly key exchange
  • WPS – involves push-button configuration but should be disabled for security

These tips summarize crucial aspects of wireless security standards.