Wi-Fi Security Protocols Overview
13 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of key does Wired Equivalent Privacy (WEP) use for encryption?

  • A shared public key
  • A dynamic key
  • A twin key system
  • A static key (correct)

Which technological advancement replaced the TKIP used in WPA?

  • CCMP (correct)
  • TLS
  • GCMP
  • AES

Which WPA version is specifically designed for enterprise environments?

  • WPA-PSK
  • WPA3-EAP
  • WPA2-PSK
  • WPA2-EAP (correct)

What security feature does WPA3 introduce for device connection?

<p>Simultaneous Authentication of Equals (D)</p> Signup and view all the answers

What is one of the recommended actions to enhance network security?

<p>Enable MAC address filtering (C)</p> Signup and view all the answers

What is one of the primary purposes of the Wi-Fi Device Provisioning Protocol (DPP) in WPA3?

<p>To allow devices to connect using NFC tags or QR codes (A)</p> Signup and view all the answers

How does Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) improve security compared to TKIP?

<p>It is based on the advanced encryption standard (AES) algorithm (B)</p> Signup and view all the answers

What key aspect differentiates WPA2-PSK from WPA2-EAP in terms of usage?

<p>WPA2-PSK relies on a shared passcode for access (B)</p> Signup and view all the answers

What does the individualised data encryption feature in WPA3 aim to achieve?

<p>To encrypt data uniquely for each user or device (D)</p> Signup and view all the answers

What is a major drawback of using WEP compared to WPA2?

<p>WEP relies on a single static key for encryption (A)</p> Signup and view all the answers

Why is the Simultaneous Authentication of Equals (SAE) significant in WPA3?

<p>It prevents attackers from eavesdropping during handshake (D)</p> Signup and view all the answers

What type of connection does Secure Socket Layer (SSL) primarily establish?

<p>Connection between a user's computer and a server (C)</p> Signup and view all the answers

Which security feature is enhanced in WPA3 compared to previous WPA versions?

<p>Individualised data encryption for users (C)</p> Signup and view all the answers

Study Notes

Wired Equivalent Privacy (WEP)

  • Uses a static key (a single key) for encryption
  • Offers 64 or 128 bit key encryption in hexadecimal
  • Aims to prevent man-in-the-middle attacks

Wi-Fi Protected Access (WPA)

  • Replaced WEP
  • Uses temporal key integrity protocol (TKIP) for dynamic key changes
  • Improved security over WEP by preventing intruders from creating their own encryption keys

Wi-Fi Protected Access 2 (WPA2)

  • An upgrade to WPA
  • Uses both encryption and authentication
  • Offers two modes:
    • Pre-shared key (personal) - WPA2-PSK: relies on a shared passcode and is used in home environments
    • Enterprise mode - WPA2-EAP: more suitable for organizations and businesses
  • Employs Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) to replace TKIP
  • CCMP utilizes the advanced encryption standard (AES) algorithm
  • Provides message authenticity and integrity verification
  • CCMP is stronger and more reliable than TKIP, making it harder for hackers to identify patterns

Wi-Fi Protected Access 3 (WPA3)

  • An upgrade to WPA2
  • Offers individualized data encryption
  • Utilizes Wi-Fi Device Provisioning Protocol (DPP)
  • Allows Near Field Communication (NFC) tags or QR codes for device network connections
  • Employs GCMP-256 bit encryption
  • Uses Simultaneous Authentication of Equals for secure handshake

Securing a Network

  • Disable SSID broadcasting
  • Enable MAC address filtering
  • Enable a firewall for traffic control
  • Use at least WPA2-PSK (or WPA2-EAP for organizations and businesses) for encryption and authentication
  • Secure passwords
  • Change all default settings

Wired Equivalent Privacy (WEP)

  • Uses a 64 or 128 bit key in hexadecimal for encryption
  • Relies on a static key for security
  • Designed to prevent "man in the middle" attacks

Wi-Fi Protected Access (WPA)

  • Replaces WEP and utilizes the Temporal Key Integrity Protocol (TKIP)
  • TKIP dynamically changes keys used by systems to enhance security

Wi-Fi Protected Access 2 (WPA2)

  • An upgrade to WPA, offering both encryption and authentication
  • Includes two modes:
    • Pre-shared key (personal) - WPA2-PSK
      • Utilizes a shared passcode for access, common in home environments
    • Enterprise mode - WPA2-EAP
      • Suitable for organizations and businesses
  • Uses Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP)
    • Replaces TKIP
    • Based on the Advanced Encryption Standard (AES) algorithm
    • Provides message authenticity and integrity verification
    • Stronger and more reliable than TKIP

Wi-Fi Protected Access 3 (WPA3)

  • An upgrade to WPA2
  • Provides individualised data encryption
  • Uses Wi-Fi Device Provisioning Protocol (DPP)
  • Supports Near Field Communication (NFC) tags and QR codes for device network joining
  • Utilizes GCMP-256 bit encryption
  • Implements Simultaneous Authentication of Equals for enhanced security

Securing a Network

  • Disable SSID broadcasting
  • Enable MAC address filtering
  • Enable a firewall for traffic control
  • Utilize at least WPA2-PSK (or WPA2-EAP for organizations and businesses) for encryption and authentication
  • Secure passwords
  • Change all default settings

Encryption

  • Converts information into ciphertext, scrambling it into a secret code
  • Prevents information from being stolen or compromised
  • Only decipherable using a unique digital key

Authentication

  • Verifies the identity of users, processes or devices
  • Ensures access to only authorized information

Secure Socket Layer (SSL)

  • A protocol that encrypts and secures data transmitted over the internet
  • Establishes a secure connection between a user's computer and a website or server, or between two servers.
  • Provides an SSL digital certificate to verify a website
  • Prevents hackers from stealing or viewing transferred information
  • Operates at layer 6 (presentation) in the OSI Model

Secure Shell (SSH)

  • A cryptography network protocol for encrypted data transfer over a network
  • Uses a username/password authentication system

Transport Layer Security (TLS)

  • Evolved from SSL
  • Encrypts data sent over the internet for security
  • Provides end-to-end security

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

This quiz explores the various Wi-Fi security protocols including WEP, WPA, and WPA2. Participants will learn about the key differences, encryption methods, and security improvements each protocol offers. Understanding these protocols is essential for ensuring secure wireless communications.

More Like This

Wi-Fi Router Security
6 questions

Wi-Fi Router Security

UnboundObsidian avatar
UnboundObsidian
WiFi Security: WEP, WPA, and WPA-2
24 questions
Wi-Fi Authentication Basics
18 questions
Use Quizgecko on...
Browser
Browser