Podcast
Questions and Answers
What does GSM stand for in wireless communications?
What does GSM stand for in wireless communications?
- Generic System for Mobile Communications
- Global System for Mobile Communications (correct)
- Global Standard for Mobile Communication
- General System for Mobile Communications
What is represented by BSSID in a wireless network?
What is represented by BSSID in a wireless network?
- Basic Service Set Identifier (correct)
- Base Station Service Identifier
- Broadband Service Set Identifier
- Binary Service Set Identifier
Which of the following best describes bandwidth in a wireless network?
Which of the following best describes bandwidth in a wireless network?
- The maximum distance between two access points
- The speed at which devices connect to the network
- The total number of users on the network
- The data transfer rate measured in bits per second (correct)
What role does an Access Point (AP) serve in a wireless network?
What role does an Access Point (AP) serve in a wireless network?
What is an SSID in the context of wireless networks?
What is an SSID in the context of wireless networks?
What technique does MIMO-OFDM primarily influence in wireless communication services?
What technique does MIMO-OFDM primarily influence in wireless communication services?
Which wireless technology is primarily associated with utilizing techniques such as DSSS, FHSS, and OFDM?
Which wireless technology is primarily associated with utilizing techniques such as DSSS, FHSS, and OFDM?
What is a key advantage of using a wireless network compared to a wired network?
What is a key advantage of using a wireless network compared to a wired network?
Which of the following is a characteristic of Direct-sequence spread spectrum (DSSS)?
Which of the following is a characteristic of Direct-sequence spread spectrum (DSSS)?
What type of equipment can create interference with Wi-Fi networks?
What type of equipment can create interference with Wi-Fi networks?
What is the main purpose of the shared key authentication process in wireless networks?
What is the main purpose of the shared key authentication process in wireless networks?
Which type of antenna is designed to radiate signals in all directions?
Which type of antenna is designed to radiate signals in all directions?
What encryption method is associated with the highest security level in wireless networks?
What encryption method is associated with the highest security level in wireless networks?
What does the 802.1X standard primarily facilitate in a wireless network?
What does the 802.1X standard primarily facilitate in a wireless network?
What is a potential risk associated with using a parabolic grid antenna?
What is a potential risk associated with using a parabolic grid antenna?
What role does the SSID play in a Wi-Fi network?
What role does the SSID play in a Wi-Fi network?
Which statement about the service set and SSID is true?
Which statement about the service set and SSID is true?
What is a major security risk associated with using default SSIDs?
What is a major security risk associated with using default SSIDs?
In an open system authentication process, what happens during the 'Unchallenged Acceptance' stage?
In an open system authentication process, what happens during the 'Unchallenged Acceptance' stage?
How does the use of WEP encryption relate to open system authentication?
How does the use of WEP encryption relate to open system authentication?
What encryption algorithm does WEP primarily utilize for securing wireless communications?
What encryption algorithm does WEP primarily utilize for securing wireless communications?
Which of the following is a significant flaw of WEP encryption?
Which of the following is a significant flaw of WEP encryption?
What role does the Initialization Vector (IV) play in the WEP encryption process?
What role does the Initialization Vector (IV) play in the WEP encryption process?
What is a major limitation of the CRC-32 checksum used in WEP?
What is a major limitation of the CRC-32 checksum used in WEP?
Which key length is used in a 128-bit WEP encryption setting?
Which key length is used in a 128-bit WEP encryption setting?
What is a main reason WEP is vulnerable to dictionary attacks?
What is a main reason WEP is vulnerable to dictionary attacks?
What feature does WPA introduce to enhance security compared to WEP?
What feature does WPA introduce to enhance security compared to WEP?
How does the IV in WEP impact encryption security?
How does the IV in WEP impact encryption security?
What is a limitation of the WEP protocol regarding key management?
What is a limitation of the WEP protocol regarding key management?
What is the significance of Temporal Keys (TKs) in the TKIP mechanism of WPA?
What is the significance of Temporal Keys (TKs) in the TKIP mechanism of WPA?
What is the primary function of the Michael Integrity Check (MIC) in TKIP?
What is the primary function of the Michael Integrity Check (MIC) in TKIP?
How does WPA2 enhance the security compared to WPA?
How does WPA2 enhance the security compared to WPA?
Which vulnerability does TKIP address in comparison to WEP?
Which vulnerability does TKIP address in comparison to WEP?
What mechanism does TKIP use to prevent replay attacks?
What mechanism does TKIP use to prevent replay attacks?
In which mode does WPA2 use a central authentication server for access control?
In which mode does WPA2 use a central authentication server for access control?
What is the interval for changing the temporal keys in TKIP?
What is the interval for changing the temporal keys in TKIP?
What main issue arises from using weak passwords in WPA PSK?
What main issue arises from using weak passwords in WPA PSK?
What does the per-packet key mixing in TKIP involve?
What does the per-packet key mixing in TKIP involve?
Which of the following is a characteristic of WPA2-Personal?
Which of the following is a characteristic of WPA2-Personal?
What allows attackers to inject malicious traffic in a network under TKIP?
What allows attackers to inject malicious traffic in a network under TKIP?
Flashcards
GSM
GSM
Global System for Mobile Communications, a universal system used for mobile data transmission in wireless networks worldwide.
Bandwidth
Bandwidth
The amount of data that can be transmitted over a connection, often measured in bits per second (bps).
Access Point (AP)
Access Point (AP)
A device that connects wireless devices to a wired or wireless network, using standards like Bluetooth and Wi-Fi.
SSID (Service Set Identifier)
SSID (Service Set Identifier)
Signup and view all the flashcards
ISM Band (Industrial, Scientific, and Medical)
ISM Band (Industrial, Scientific, and Medical)
Signup and view all the flashcards
Association
Association
Signup and view all the flashcards
OFDM
OFDM
Signup and view all the flashcards
MIMO-OFDM
MIMO-OFDM
Signup and view all the flashcards
DSSS
DSSS
Signup and view all the flashcards
FHSS (Frequency-hopping spread spectrum)
FHSS (Frequency-hopping spread spectrum)
Signup and view all the flashcards
What is an SSID (Service Set Identifier)?
What is an SSID (Service Set Identifier)?
Signup and view all the flashcards
What is a Service Set?
What is a Service Set?
Signup and view all the flashcards
Open System Authentication Process
Open System Authentication Process
Signup and view all the flashcards
Non-Secure Access Mode
Non-Secure Access Mode
Signup and view all the flashcards
What is a BSSID (Basic Service Set Identifier)?
What is a BSSID (Basic Service Set Identifier)?
Signup and view all the flashcards
What is WEP?
What is WEP?
Signup and view all the flashcards
How does WEP use a shared key for security?
How does WEP use a shared key for security?
Signup and view all the flashcards
How does WEP's RC4 stream cipher work?
How does WEP's RC4 stream cipher work?
Signup and view all the flashcards
What is a major weakness of WEP?
What is a major weakness of WEP?
Signup and view all the flashcards
Why is WEP unsuitable for modern wireless networks?
Why is WEP unsuitable for modern wireless networks?
Signup and view all the flashcards
Centralized Wi-Fi Authentication
Centralized Wi-Fi Authentication
Signup and view all the flashcards
WPA (Wi-Fi Protected Access)
WPA (Wi-Fi Protected Access)
Signup and view all the flashcards
WPA2 (Wi-Fi Protected Access 2)
WPA2 (Wi-Fi Protected Access 2)
Signup and view all the flashcards
WPA3 (Wi-Fi Protected Access 3)
WPA3 (Wi-Fi Protected Access 3)
Signup and view all the flashcards
Directional Antenna
Directional Antenna
Signup and view all the flashcards
WEP's Vulnerability to Dictionary Attacks
WEP's Vulnerability to Dictionary Attacks
Signup and view all the flashcards
WEP's Vulnerability to DoS Attacks
WEP's Vulnerability to DoS Attacks
Signup and view all the flashcards
WEP's Short IV Vulnerability
WEP's Short IV Vulnerability
Signup and view all the flashcards
WEP's One-time Cipher Limitation
WEP's One-time Cipher Limitation
Signup and view all the flashcards
WEP's Key Scheduling Algorithm Vulnerability
WEP's Key Scheduling Algorithm Vulnerability
Signup and view all the flashcards
TKIP (Temporal Key Integrity Protocol)
TKIP (Temporal Key Integrity Protocol)
Signup and view all the flashcards
Per-packet key mixing
Per-packet key mixing
Signup and view all the flashcards
Message Integrity Check (MIC)
Message Integrity Check (MIC)
Signup and view all the flashcards
Sequence Counter
Sequence Counter
Signup and view all the flashcards
WPA2-Personal
WPA2-Personal
Signup and view all the flashcards
WPA2-Enterprise
WPA2-Enterprise
Signup and view all the flashcards
Lack of Forward Secrecy in WPA
Lack of Forward Secrecy in WPA
Signup and view all the flashcards
Vulnerability to Packet Spoofing and Decryption in WPA
Vulnerability to Packet Spoofing and Decryption in WPA
Signup and view all the flashcards
Guessing of IP Addresses in WPA
Guessing of IP Addresses in WPA
Signup and view all the flashcards
Study Notes
Wireless Network Concepts
- A wireless network uses radio-frequency technology and electromagnetic (EM) waves for data communication, eliminating the need for multiple wired connections.
- Wireless networks operate at the physical layer of a network structure.
- Technologies like Wi-Fi (IEEE 802.11) provide wireless access within a range of an access point.
- Wireless networks offer advantages like easy installation and flexible connectivity in difficult-to-wire areas; however, they may have security concerns and bandwidth limitations.
Wireless Terminology
- GSM: Global System for Mobile Communications, a global mobile data transmission standard.
- Bandwidth: The amount of information transmitted over a connection, measured in bits per second (bps).
- Access Point (AP): Connects wireless devices to a wired or wireless network, acting as a bridge between wired and wireless.
- BSSID (Basic Service Set Identifier): The MAC address of an AP, defining a Basic Service Set (BSS). Users typically aren't aware of the specific BSS.
- SSID (Service Set Identifier): A unique name for a wireless network (WLAN), allowing a user to select it from the available networks. All devices on the same WLAN must use the same SSID.
- ISM Band: A set of frequencies used by industrial, scientific, and medical applications.
- Hotspot: A public area with Wi-Fi access for users to connect to the internet.
- Association: The process of connecting a wireless device to an access point (AP).
- OFDM (Orthogonal Frequency-Division Multiplexing): A digital modulation method that splits a signal into multiple orthogonal frequencies, increasing data rates and sharing bandwidth.
- MIMO-OFDM (Multiple-Input Multiple-Output Orthogonal Frequency-Division Multiplexing): A technique improving spectral efficiency in 4G and 5G wireless communication by reducing interference.
- DSSS (Direct-Sequence Spread Spectrum): A spread spectrum technique adding a pseudo-random noise (PN) code to protect against interference and jamming.
- FHSS (Frequency-Hopping Spread Spectrum) / FH-CDMA (Frequency-Hopping Code-Division Multiple Access): A method rapidly switching a carrier among many frequency channels for securing communications by preventing interception or jamming.
Wireless Network Types
- Extension to a Wired Network: Adding APs to extend the range and functionality of an existing wired network by bridging wireless devices with the network. Types of APs include software-based and hardware-based.
- Multiple Access Points: Using multiple APs that overlap to enable seamless roaming between overlapping areas.
- LAN-to-LAN Wireless Network: Connecting multiple LANs wirelessly for data exchange.
- 3G/4G Hotspot: A portable device providing Wi-Fi access through a cellular signal.
Wireless Standards
- SSID: A 32 alphanumeric-character unique identifier for a WLAN, crucial for network identification and connection.
- Service Set: A group of devices connected to the same Wi-Fi network with the same SSID.
- Wi-Fi Authentication Modes: Methods such as open system authentication (least secure), shared key authentication (uses a secret key), and centralized authentication (typically requiring a RADIUS server). Open authentication has no real security; should not be used on private or business networks.
Wireless Encryption Algorithms
-
WEP (Wired Equivalent Privacy): An older encryption standard, easily crackable due to vulnerabilities in its keys and IVs.
-
WPA (Wi-Fi Protected Access): An improved security protocol using Temporal Key Integrity Protocol (TKIP) for stronger encryption.
-
WPA2 (Wi-Fi Protected Access 2): A further enhancement using AES and CCMP, more secure than WPA.
- WPA2-Personal and WPA2-Enterprise for different authentication methods. Personal uses a shared key, while Enterprise provides individual device authentication through RADIUS servers.
-
WPA3 (Wi-Fi Protected Access 3): The latest standard using the Simultaneous Authentication of Equals (SAE) protocol for enhanced security against offline attacks.
Wireless Threats
-
Access Control Attacks:
- WarDriving: Discovering WLANs by sending probe requests or listening.
- Rogue Access Points: Unauthorized APs placed within a network to gain access.
- MAC Spoofing: An attacker uses a forged MAC address to impersonate a legitimate AP to gain access.
- AP Misconfiguration: A security risk from improper AP settings or default configurations.
-
Integrity Attacks:
- Data Frame Injection: Sending forged frames to manipulate the network.
- Bit-Flipping Attacks: Altering data packets by changing bits.
- Replay Attacks: Reusing captured frames.
-
Confidentiality Attacks:
- Eavesdropping: Intercepting network traffic without authorization.
- Traffic Analysis: Inferring information from network traffic patterns.
- Evil Twin APs: A fake AP mimicking a legitimate network to gain access.
- Session Hijacking: Taking control of an ongoing network session.
-
Availability Attacks:
- Denial-of-Service (DoS): Flooding the network with traffic to prevent legitimate users from accessing services.
- Jamming Attacks: Causing interference by broadcasting strong signals that disrupt communications.
- ARP Cache Poisoning: Manipulating ARP tables to redirect network traffic.
Wireless Antennas
- Directional Antennas: Focusing transmission and reception in特定 directions. Includes Yagi antennas.
- Omnidirectional Antennas: Radiating in all directions equally, like those used in radio stations.
- Parabolic Grid Antennas: Focusing radio signals over long distances.
- Dipole Antennas: A bidirectional antenna using half a wavelength.
- Reflector Antennas: Concentrating EM energy at a focal point.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.