click below
click below
Normal Size Small Size show me how
Chapter 9
Study Stack for Chapter 9
| Term | Definition |
|---|---|
| bluejacking | An attack that sends unsolicited messages to Bluetooth devices. |
| bluesnarfing | An attack that accesses unauthorized information from a wireless device through a bluetooth connection. |
| Bluetooth | A wireless technology that uses short range RF and provides rapid ad hoc device pairings. |
| captive portal AP | An infrastructure that is used on public access WLANs to provide a higher degree of security. |
| Challenge-handshake authentication protocol (CHAP) | a weak authentication protocol that has been replaced with Extensible Authentication Protocol. |
| Counter Mode with Cipher Block Chaining Message Authentication Code Protocol. | The encryption protocol used for WPA2 that specifies the use of a general-purpose cipher mode algorithm providing data privacy with AES. |
| evil twin | An AP set up by an attacker to mimic an authorized AP and capture transmissions, so a user's device will unknowingly connect to the evil twin instead of a legitimate AP. |
| Extensible Authentication Protocol | A framework for transporting authentication protocols that defines the format of the messages. |
| initialization vector | A 24-bit value used in WEP that changes each time a packet is encrypted. |
| Lightweight EAP (LEAP) | A proprietary EAP method developed by Cisco Systems requiring mutual authentication used for WLAN encryption using Cisco client software. |
| MAC address filtering | A method for controlling access to a WLAN based on a device's MAC address. |
| NFC | A set of standards primarily for smart phones and smart cards that can be used to establish communication between devices in close proximity. |
| Password Authentication Protocol | A weak authentication protocol that has been replaced by EAP. |
| preshared key | The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating. |
| Protected EAP | An EAP method designed to simplify the deployment of 802.1x by using microsoft windows logins and passwords. |
| RF jamming | Intentionally flooding the RF spectrum with noise to prevent accurate reception of transmissions. |