Net Sec U8 - Wireless Networking

Nick.Bell2013
Mind Map by , created over 6 years ago

Mind Map on Net Sec U8 - Wireless Networking, created by Nick.Bell2013 on 04/30/2013.

53
8
0
Tags No tags specified
Nick.Bell2013
Created by Nick.Bell2013 over 6 years ago
1.3 Network and Security Components
DJ Perrone
Types of Attacks
River L.
U1. OSI 7 Layer Reference Model
Craig Parker
Biology B1.1 - Genes
raffia.khalid99
1PR101 2.test - Část 2.
Nikola Truong
CCNA Security 210-260 IINS - Exam 1
Mike M
CCNA Security 210-260 IINS - Exam 2
Mike M
SY0-401 Part 1 (50 questions)
desideri
CCNA Security 210-260 IINS - Exam 1
Ricardo Nuñez
CCNA Security 210-260 IINS - Exam 3
irvin pastora
Net Sec U8 - Wireless Networking
1 Wireless LANs
1.1 vulnerabilities
1.1.1 anyone can receive
1.1.1.1 anyone can transmit
2 802.11
2.1 standards
2.1.1 Infrastructure mode
2.1.1.1 BSS
2.1.1.1.1 SSID
2.1.1.2 ESS
2.1.2 Ad-hoc mode
2.1.2.1 IBSS
2.2 physical layer
2.2.1 DSSS
2.3 data link layer
2.3.1 LLC
2.3.2 MAC
2.3.3 CSMA/CA
2.3.4 'hidden nodes
2.4 security issues
2.4.1 Access Point Roaming
2.4.2 Interception
2.4.3 War-driving
2.4.3.1 AP Config
2.4.3.1.1 Evil Twin APs
2.4.3.1.1.1 Rogue APs or Ad-hoc networks
2.4.3.1.1.1.1 Denial of Service
2.4.3.1.1.1.1.1 Hub Broadcasts
2.5 SKA
2.6 WEP
3 802.11b
3.1 weaknesses
3.1.1 Initialisation vector
3.1.2 WEP keys
3.1.2.1 weak
3.1.2.2 Brute forcing
3.2 beyond
3.2.1 802.1x
3.2.1.1 802.11i
4 Safeguards
4.1 untrusted LAN
4.2 Sec. policy & architecture
4.3 discover unauthorised use
4.4 AP Audits
4.5 station protection
4.6 AP Locations
4.7 MAC address locking
5 Bluetooth
5.1 Piconets & Scatternets
5.2 Architecture
5.3 connection states
5.3.1 active
5.3.2 sniff
5.3.3 hold
5.3.4 park
5.4 security modes
5.4.1 non-secure
5.4.2 service level enforced
5.4.3 link level enforced
5.5 link layer services
5.5.1 authentication of peer devices
5.5.2 confidentiality for transmitted data
5.5.3 initialisation link key
5.5.4 unit link key
5.5.5 combination & master link key
5.6 vulnerabilities
5.6.1 PINs
5.6.1.1 entry impractical
5.6.1.2 length
5.6.2 unit key reuse
5.6.3 unique addreses
5.6.4 Denial of Srv.
5.6.5 MitM attacks
5.6.6 only device authenticated
5.7 safeguards
5.7.1 Max PIN lengths
5.7.2 Policy
5.7.3 end-to-end security

Media attachments