click below
click below
Normal Size Small Size show me how
Chapter 9 Security
Term | Definition |
---|---|
bluejacking | An attack that sends unsolicited messages to bluetooth enabled devices |
Bluesnarfing | an attack that accesses unauthorized information from a wireless device through a bluetooth connection |
bluetooth | a wireless technology that uses short range radio frequency transmissions and provides rapid ad hoc device pairings |
Captive Portal AP | An infrastructure that is used on a public access WLANs to provide a higher degree of security |
Challenge Handshake Authentication Protocol | A weak authentication protocol that has been replaced by the extensible authentication protocol |
Counter Mode with Cipher Block Chaining message Authentication Code Protocol | The encryption protocol used for WPA2 that specifies the use of a general purpose cipher mode algorithm providing data privacy with aes |
Evil Twin | An AP set up by an attacker to mimic an authorized AP and capture transmissions so a users device will unknowingly connect to this evil twin instead of the authorized AP |
Extensible Authentication Protocol | A framework for transporting authentication protocols that defines the format of the messages |
Initialization Vector | A 24 bit value used in WEP that changes each time a packet is encrypted |
Lightweight EAP | A proprietary EAP method developed by Cisco Systems requiring mutual authentication used for WLAN encryption using cisco client software |
Media Access Control Address Filtering | A method for controlling access to a WLAN based on the devices MAC address |
Near Field Communications | A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity |
Password Authentication Protocol | A weak authentication Protocol that has been replaced by the extensible authentication protocol |
Preshared Key | The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating |
Protected EAP | An EAP method designed to simplify the deployment of 802.1x by using microsoft windows logins and passwords |
RF Jamming | Intentionally flooding the radio freqency spectrum with extraneous RF signal noise that creates interference and prevents communication from occuring |
Rogue Access Point | An unauthorized AP that allows an attacker to bypass many of the network security configurations and open the network securit configurations and opens the network and its users to attacks |
Service Set Identifier | The alphanumeric user Supplied network name of a WLAN |
Site Survey | An in depth examination and analyisis of a wireless LAN site |
Temporal Key Integrity Protocol | The WPA and WPA2 ecryption technology |
War Chalking | The procwss of documenting and then advertising the location of wireless LANS for others to use |
War Driving | Searching for wireless signals from an automobile or on foot using a portable computing device |
Wifi Protected Access | The original set of protections from the wifi alliance that addresses authentication and encryption on WLANs and is currently the most secure model for WIFI security |
WIFI Protected Access 2 | The second geration of WPA security from the WIFI alliance that address authentication and encryption on WLANS |
WIFI Protected Setup | An optional means of configuring security on wireless local area netowrks primarily intended to help users who have little or no knowledge of security |
Wired Equivalant Privacy | An IEEE 802.11 security protocol designed to ensure that only authorized parties can view tranmitted wireless information |
Wireless Local Area Network | A wireless network designed to replace or supplement a wired local area network |
Wireless Replay | A passive attack in which the attacker captures transmitted wireless data records it and sends it on to the original recipient without the attackers presence being detected |