Podcast
Questions and Answers
Which type of packet is NOT used with Extensible Authentication Protocol (EAP)?
Which type of packet is NOT used with Extensible Authentication Protocol (EAP)?
What is the purpose of a rogue AP in a wireless network?
What is the purpose of a rogue AP in a wireless network?
Which technology is primarily aimed at smartphones and smartcards for communication with devices in proximity?
Which technology is primarily aimed at smartphones and smartcards for communication with devices in proximity?
What are two wireless security standards widely used today?
What are two wireless security standards widely used today?
Signup and view all the answers
How is controlling access to a WLAN commonly achieved through the access point (AP)?
How is controlling access to a WLAN commonly achieved through the access point (AP)?
Signup and view all the answers
What feature of WLANs makes them often targeted by attackers?
What feature of WLANs makes them often targeted by attackers?
Signup and view all the answers
What security mistakes might naïve wireless users make that can expose them to attacks?
What security mistakes might naïve wireless users make that can expose them to attacks?
Signup and view all the answers
What is the purpose of IEEE standards in wireless local area networks (WLANs)?
What is the purpose of IEEE standards in wireless local area networks (WLANs)?
Signup and view all the answers
What is a key flaw associated with WEP and WPS in wireless security?
What is a key flaw associated with WEP and WPS in wireless security?
Signup and view all the answers
Why is detecting rogue access points important for wireless network security?
Why is detecting rogue access points important for wireless network security?
Signup and view all the answers
Study Notes
Wireless Network Security Fundamentals
Wireless Attacks
- Wireless data systems are vulnerable to various attacks, including:
- Bluetooth attacks
- Near Field Communication (NFC) attacks
- Radio Frequency Identification (RFID) attacks
- Wireless Local Area Network (WLAN) attacks
Bluetooth Attacks
- Bluetooth is a wireless technology using short-range radio frequency (RF) transmissions
- Bluetooth attacks include:
- Bluejacking: sending unsolicited messages to Bluetooth-enabled devices
- Bluesnarfing: accessing unauthorized information from a wireless device through a Bluetooth connection
Near Field Communication (NFC) Attacks
- NFC is a set of standards used to establish communication between devices in close proximity
- NFC devices can be active or passive
- Examples of NFC uses include:
- Contactless payment systems
- Automobile entertainment
- Office and retail stores
- Transportation
Radio Frequency Identification (RFID) Attacks
- RFID is commonly used to transmit information between employee identification badges, inventory tags, and other paper-based tags
- RFID tags are susceptible to different attacks
- Most RFID tags are passive and do not have their own power supply
Wireless Local Area Network (WLAN) Attacks
- A WLAN is designed to replace or supplement a wired LAN
- WLAN versions include:
- IEEE 802.11
- IEEE 802.11a
- IEEE 802.11b
- IEEE 802.11g
- IEEE 802.11n
- IEEE 802.11ac
- IEEE 802.11ax
- WLAN hardware includes:
- Wireless client network interface card adapters
- Access points (APs)
- WLAN attacks include:
- Rogue access points
- Evil twins
- Intercepting wireless data
- Wireless Denial of Service (DoS) attacks
- Spoofing
- Manipulating duration field values
Vulnerabilities of WLAN Security
- Wired Equivalent Privacy (WEP) has vulnerabilities, including:
- Short initialization vector (IV)
- Repeatable IVs
- Wi-Fi Protected Setup (WPS) has design and implementation flaws
- MAC address filtering has vulnerabilities, including:
- MAC addresses are initially exchanged in an unencrypted format
- Managing a large number of addresses is challenging
Wireless Security Solutions
- Wi-Fi Protected Access (WPA) and WPA2 are more secure than WEP
- WPA2 addresses encryption and authentication
- Wi-Fi Protected Access 3 (WPA3) is the next generation of WPA, with improvements including:
- Simultaneous Authentication of Equals (SAE)
- Individual data encryption
- Improved interaction with Internet of Things (IoT) devices
- Other security steps include:
- Installation and configuration
- Specialized systems communications
- Rogue AP system detection
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on wireless network security fundamentals with this quiz based on Module 11 of CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition by Mark Ciampa. Questions cover wireless network attacks, vulnerabilities of WLAN security, and more.