Shared Flashcard Set

Details

Security+ 4th ed. Chapter 08
Ciampa's Security+ Guide to Network Security Fundamentals
20
Other
Undergraduate 4
10/27/2011

Additional Other Flashcards

 


 

Cards

Term
Bluejacking
Definition
An attack that sends unsolicited messages to Bluetooth-enabled devices.
Term
Bluesnarfing
Definition
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
Term
Bluetooth
Definition
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings.
Term
Evil twin
Definition
An AP set up by an attacker to mimic an authorized AP and capture transmissions, so a user’s device will unknowingly connect to this evil twin instead.
Term
Extensible Authentication Protocol (EAP)
Definition
A framework for transporting authentication protocols that defines the format of the messages.
Term
Initialization vector (IV)
Definition
A 24-bit value used in WEP that changes each time a packet is encrypted.
Term
Keystream attack (IV attack)
Definition
A method of determining the keystream by analyzing two packets that were created from the same initialization vector (IV).
Term
Lightweight EAP (LEAP)
Definition
A proprietary EAP method developed by Cisco Systems requiring mutual authentication used for WLAN encryption using Cisco client software.
Term
Media Access Control (MAC) address filtering
Definition
A method for controlling access to a WLAN based on the device’s MAC address.
Term
Preshared key (PSK)
Definition
A key value that must be created and entered into both the access point and all wireless devices (“shared”) prior to (“pre”) the devices communicating with the AP.
Term
Protected EAP (PEAP)
Definition
An EAP method designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords.
Term
Rogue access point
Definition
An unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.
Term
Service Set Identifier (SSID)
Definition
The user-supplied network name of a WLAN; it can generally be alphanumeric from 2 to 32 characters.
Term
SSID broadcast
Definition
The transmission of the SSID from the access point to wireless devices.
Term
Temporal Key Integrity Protocol (TKIP)
Definition
A WPA encryption technology.
Term
War chalking
Definition
The process of documenting and then advertising the location of wireless LANs for others to use. Wireless networks were identified by drawing on sidewalks or walls around the area of the network.
Term
War driving
Definition
Searching for wireless signals from an automobile or on foot using a portable computing device.
Term
Wi-Fi Protected Access (WPA)
Definition
The original set of protections from the Wi-Fi Alliance in 2003 designed to protect both present and future wireless devices.
Term
Wi-Fi Protected Access 2 (WPA2)
Definition
The second generation of WPA security from the Wi-Fi Alliance in 2004 to address authentication and encryption on WLANs.
Term
Wired Equivalent Privacy (WEP)
Definition
An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP has significant vulnerabilities and is not considered secure.
Supporting users have an ad free experience!