click below
click below
Normal Size Small Size show me how
Security Chap 9
Term | Definition |
---|---|
bluejacking | an attack that sends unsolicited messages to Bluetooth-enabled devices |
bluesnarfing | attack that accesses unauthorized info from a wireless device through a Bluetooth connection |
Bluetooth | a wireless technology that uses short range radio frequency transmissions and provides rapid ad hoc device pairings |
captive portal AP | an infrastructure that is used on public access WLANs to provide a higher degree of security |
CHAP | a weak authentication protocol that has been replaced by the EAP |
CCMP | encryption protocol used for WPA2 that specifies the use of a general-purpose cipher mode algorithm providing data privacy with AES |
evil twin | an AP setup by an attacker to mimic an authorized AP and capture transmissions, so a users device will unknowingly connect to this evil twin instead of the authorized AP |
EAP | a framework for transporting authentication protocols that defines the format of the messages |
IV | a 24-bit value used in WEP that changes each time a packet is encrypted |
LEAP | a proprietary EAP method developed by Cisco Systems requiring mutual authentication used for WLAN encryption using Cisco client software |
MAC address filtering | a methood for controlling access to a WLAN based on the device's MAC address |
NFC | a set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity |
PAP | a weak authentication protocol that has been replaced by the EAP |
PSK | the authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating |
PEAP | an EAP method designed to simplify the deployment of 802.1x by using microsoft Windows logins and passwords |
Rf jamming | intentionally flooding the radio frequency spectrum with extraneous RF signal "noise" that creates interference and prevents communications from occurring |
rogue access point | an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks |
SSID | the alphanumeric user-supplied network name of a WLAN |
Site survey | an in-depth examination and analysis of a wireless LAN site |
TKIP | the WPA and WPA2 encryption technology |
war chalking | process of documenting and advertising the location of wireless LANs for others to use |
war driving | searching for wireless signals from an automobile or on foot using a portable computing device |
WPA | the origional set of protections from the wi-fi Alliance designed to address both encryption and authentication |
WPA2 | the second generation of WPA security from the Wi-Fi Alliance that addresses authentication and encryption on WLANs and is currently the most secure model for WI-Fi security |
WPS | an optional means of configuring security on wireless local area networks primarily intended to help others who have little to no knowledge of security to quickly and easily in=mplement security on their WLANs. |
WEP | an IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information |
WLAN | a wireless network designed to replace or supplement a wired local area network |
wireless reply | a passive attack on which the attacker captures transmitted wireless data, records it, and then sends it on to the origional recipient without the attacker's presence being detected. |