WLAN Security Flashcards

1
Q

802.11 Security Basics?

A

Data Privacy
Authentication, Authorization, And Accounting
Segmentation
Monitoring and Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Privacy?

A

Encryption

  • RC4 Cipher
  • AES (Advanced Encryption Standard)

MAC Service Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(AAA)?

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication?

A

Identify and Credential Verification, who and what?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authorization?

A

Granting Access,

What can you do?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Accounting?

A

Tracking the use of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rule of AAA?

A

Authentication is required before association and authorization can be allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Segmentation?

A

Based Upon Traffic Type
Based Upon Client Type
Based Upon Authentication or Authorization

LANs
WANs
VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Monitoring

A

Monitoring gives vision into Network performance and Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Monitoring may use?

A

WIDS

WIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Policy?

A

Policy defines how computer systems must be implemented

  • Specific WiFi policies must be created
  • Traditional wired policies are not sufficient
  • Should be written and adaptable as technology changes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Legacy 802.11 Security?

A

Allows legacy client access
Uses older security measures
Is specified in the 802.11 standard as amended
Can be the weak spot of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of Security of 802.11

A

Legacy Authentication
Static WEP Encryption
MAC Filters
SSID Cloaking/Hiding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Legacy Authentication?

A
Open system or shared key authentication
Wired Equivalent Privacy
Pre-shared keys
Weak when compared to more modern methods
Still used for legacy devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Open System Authentication?

A

Two way exchange between the client radio and the access point

  • The client sends and authentication request
  • The access point then sends an authentication response

Does not require any credential
Anybody can have association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Shared Key Authentication?

A

Four-way authentication frame handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Four-Way authentication frame handshake?

A

The client station sends an authentication request to the access point
The access point sends a cleartext challenge to the client station in an authentication response
The client station encrypts the cleartext challenge and sends it back to the access point in the body of another authentication request frame.
The access point decrypts the station’s response and compares it to the challenge text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Static WEP Encryption?

A

Uses a 24bit Initialization Vector

Can use either a 40 bit or 104 bit encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

WEP Provides?

A

Data Integrity
Confidentiality
Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data Integrity?

A

A data integrity checksum known as the integrity check value is computed on a data before encryption and used to prevent data from being modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Confidentiality?

A

The primary goal of confidentiality was to provide data privacy by encrypting the data before transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Access Control?

A

For WEP this is a crude form of authorization
Client stations that do not have the same matching static WEP key as an access point are refused to access to network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

WEP Encryption Process?

A

RC4 - Rivest Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

WEP Weaknesses?

A

IV Collisions Attack
Weak Key Attack
Reinjection Attack
Bit-flipping Attack

Easily cracked using freeware
Not allowed in CDE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Other Security Measures?
MAC Filters SSID Cloaking In and of themselves these measures are not sufficient Can be a part of a layered approach
26
MAC Filters?
Block or Allow clients based upon MAC Address Easily Bypassed through spoofing Time consuming to implement Does not scale well
27
SSID Cloaking?
Removes the SSID from Beacon frames Does not stop the SSID from being used in the other frames May cause Roaming problems Forces the use of Active scanning in the service set
28
Robust Security Network?
Two stations must authenticate and associate with each other Create dynamic encryption keys through a process known at the 4-way Handshake
29
Components of RSN?
``` Authentication and Authorization 802.1x/EAP Framework Dynamic Encryption Key Generation 4-Way Handshake WPA/WPA2-Personal TKIP Encryption CCMP Encryption ```
30
Authentication And Authorization?
Identity/Credential Verification - Part of AAA - Grants Access to network and or resources Pre-shared key authentication (personal) - No need for external database Server-based authentication - Required AAA server - May require directory access database server
31
PSK Authorization?
Standard defines Authentication and Key Management services
32
During 802.1X authentication, an authentication and key management protocol can be either?
``` A preshared (PSK) protocol An EAP protocol ```
33
Name marketing names for PSK authentication?
WPA/WPA2-Passphrase WPA/WPA2-PSK WPA/WPA2-Preshared Key
34
802.1X/EAP Framework
Based on EAP | Supports Mutiple EAP Types
35
EAP?
Extensible Authentication Protocol | Port Based Access Control
36
Three Main Components?
Supplicant Authenticator Authentication Server
37
TKIP?
Temporal Key Integrity Protocol
38
TKIP Encryption?
``` Optional encryption for an RSN Use constitutes a Legacy RSN Uses a 48 bit Initialization vector Uses the MIC Adds 20 bits of Overhead to frames ```
39
MIC?
Message Integrity Check
40
CCMP?
Counter-Mode (CM) with Cipher Block Chaining (CBC) Message Authentication Code (MAC) Protocol
41
CCMP Encryption?
``` Required for an 802.11 RSN Uses the Rijndael algorithm Uses an 8 byte MIC Stronger than TKIP Requires more robust chipset to function ```
42
Traffic Segmentation?
VLANs - Guest - Voice - Data RBAC
43
RBAC?
Role-Based Access Control
44
Role Based Access Control?
Is an approach to restricting system access to authorized users.
45
3 Main components of an RBAC?
Users Roles Permissions
46
RBAC Permissions can be defined as?
Layer 2 permissions Layer 3 permissions Layer 4-7 permissions Bandwidth permissions
47
Layer 2 permissions?
MAC Filters
48
Layer 3 permissions?
Access control lists
49
Layers 4-7 permissions?
Stateful firewall rules
50
VPN Wireless Security?
Protocols | Encryption
51
Protocols of VPN?
Point to Point Tunneling Protocol | Layer L2 Tunneling Protocol
52
Encryption of VPN?
Microsoft Point-To-Point Encryption | Internet Protocol Security
53
Guest WLAN Security?
Guest SSID Guest VLAN Firewall Policy Captive Web Portal
54
Guest SSID?
Multiple corporate SSIDs are broadcasted by the company APs along with a guest SSID
55
Guest VLAN?
Guest traffic is usually segmented from corporate user traffic in a unique VLAN tied to a unique guest subnet Guest traffic is often also routed to a demilitarized zone
56
e.g. MCAT, pharma, bar exam, Spanish, Series 7 Dismiss Search Bar Search Flashcards in “WLAN Security” Firewall Policy?
Guest users are not allowed on private networks because corporate network servers and resources usually reside on the private IP space
57
Captive Web Portal?
Guest users must normally log in through a captive web portal page before they can proceed to the Internet
58
Wireless Security Management?
Wireless Attacks Intrusion Monitoring Security Policy
59
Wireless Attacks?
``` Rogue Wireless Devices Peer-To-Peer Attacks Eavesdropping Encryption Cracking Authentication Attacks MAC Spoofing. ... ```
60
Rogue Wireless Devices?
Unsanctioned Devices on the Sanctioned Network Located Behind Firewalls Growing Risk ESS or IBSS Devices
61
Intrusion Monitoring?
Wireless Intrusion Detection System Wireless Intrusion Prevention System Mobile WIDS/WIPS Spectrum Analysis
62
Wireless Intrusion Detection?
``` Server uses: signature analysis protocol analysis behavior analysis rf spectrum analysis ```
63
Wireless Security Policy?
General Security Policy Functional Security Policy Legislative Compliance Industry Compliance
64
General Security Policy?
``` Statement of Authority Appliance Audience Violation Reporting Procedures Risk Assessment and Threat Analysis Security Auditing ```
65
Functional Security Policy?
Policy Essentials Baseline Practices Design and Implementation Monitoring and Response