Wireless Terms

Description

MSCS654 Wireless and Mobile Security Study Guide
Kyle Ferland
Mind Map by Kyle Ferland, updated more than 1 year ago
Kyle Ferland
Created by Kyle Ferland over 6 years ago
10
0

Resource summary

Wireless Terms
  1. 802.1X LAN and wireless IEEE standard
    1. 802.1X provides an authentication framework for wireless LANs, allowing a user to be authenticated by a central authority. The specific authentication is left up to the provider
    2. 802.11. A set of physical and MAC specifications for implementing WLAN computer communication in the 900 MHz and 2.4, 3.6, 5, and 60 GHz frequency bands
      1. 802.11ac. 5 GHz band, more spatial streams (up to eight versus four), higher-order modulation. 433.3 Mbit/s per
        1. Wave 1. Channels up to 80 MHz
          1. Wave 2. Channels up to 160 MHz
          2. a. 5 GHz band with a maximum net data rate of 54 Mbit/s, plus error correction code. OFDM
            1. b. 2.4 GHz band. maximum raw data rate of 11 Mbit/s. uses the same media access method defined in the original standard
              1. g. Same OFDM method as a. 2.4 GHz band. 54 Mbit/s exclusive of forward error correction codes, or about 22 Mbit/s average throughput
                1. n. both the 2.4 GHz and the 5 GHz bands. maximum net data rate from 54 Mbit/s to 600 Mbit/s. multiple-input multiple-output antennas (MIMO)
                  1. i. Robust Security Network (RBN) or WPA2 implementing AES-PSK
                    1. e. quality of service (QoS) enhancements for wireless LAN applications through modifications to the Media Access Control (MAC) layer.
                      1. p. adds wireless access in vehicular environments (WAVE), a vehicular communication system
                        1. r. fast BSS transition (FT), also called "fast roaming." allows for the part of the key derived from the server to be cached in the wireless network, so that future connections can be based on the cached key, avoiding the 802.1X process
                          1. w. increases the security of its management frames and offers replay protection (MitM)
                          2. Rogue Access Points
                            1. This is an access point set up by a hacker to mimic an actual network device. The attacker uses their own machine to intercept traffic
                            2. DoS Denial of Service attacks disrupt service by flooding a network device with more requests than it can handle
                              1. Volume Based Attacks. Volume based attacks attack the machine with a large amount of requests. This usually exhausts the host’s resources which is when it will drop its service. Normally when a packet is sent, the sender will wait for a response before another request In a flood attack, the sender sends many requests without waiting for a response. This slowly builds up in the server’s memory until it is exhausted or service is significantly slowed.
                                1. Protocol attacks exploit known vulnerabilities in the TCP/IP suite of protocols. TCP and IP are two different protocols at separate layers in the OSI model which can be targeted in distinct ways. There are other less-used protocols that also have vulnerabilities but for the sake of brevity will not be discussed. These are performed by mal-formed packets or interrupting the normal flow of the protocol
                                  1. Application Layer Attacks. HTTP attacks do not utilize mal-formed packets or spoofing that other techniques utilize. Instead GET and POST requests are utilized to target the server. Zero day attacks exploit vulnerabilities for which no patch has yet been applied.
                                  Show full summary Hide full summary

                                  Similar

                                  CCNA Security 210-260 IINS - Exam 3
                                  Mike M
                                  Application of technology in learning
                                  Jeff Wall
                                  Innovative Uses of Technology
                                  John Marttila
                                  Ch1 - The nature of IT Projects
                                  mauricio5509
                                  The Internet
                                  Gee_0599
                                  SQL Quiz
                                  R M
                                  CCNA Answers – CCNA Exam
                                  Abdul Demir
                                  Professional, Legal, and Ethical Issues in Information Security
                                  mfundo.falteni
                                  System Analysis
                                  R A
                                  Flash Cards Networks
                                  JJ Pro Wrestler
                                  EDUC260- Multimodal Literacies for a Digital Age
                                  angelwoo2002