Lesson 14

studied byStudied by 0 people
0.0(0)
get a hint
hint

A Wi-Fi network that does not require a password or key to connect, making it accessible to anyone in the vicinity. Data transmitted on open networks is unencrypted and visible to anyone with a wireless network card.

1 / 19

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

20 Terms

1

A Wi-Fi network that does not require a password or key to connect, making it accessible to anyone in the vicinity. Data transmitted on open networks is unencrypted and visible to anyone with a wireless network card.

Open Wi-Fi Network

New cards
2

An encryption algorithm that uses a 56-bit key to encrypt data. It is now considered antiquated and insecure, as it can be compromised by brute force methods in less than a day.

Data Encryption Standard (DES)

New cards
3

A symmetric encryption algorithm that uses the DES algorithm three times in a row to encrypt data. While it increases the complexity of encryption, it can still be compromised, especially as more data is sent in a single session.

Triple Data Encryption Standard (3DES)

New cards
4

A highly secure form of encryption widely used today. It can use a 128-bit, 192-bit, or 256-bit key, with longer key lengths providing stronger security.

Advanced Encryption Standard (AES)

New cards
5

An early wireless security standard that aimed to provide the same level of security as a wired network. It uses a 40-bit or 104-bit encryption key, which can be easily compromised using brute force methods. It has been deprecated and is no longer recommended.

Wired Equivalent Privacy (WEP)

New cards
6

A wireless security standard designed to overcome the weaknesses of WEP. It uses a variable-length alphanumeric passphrase and employs the Temporal Key Integrity Protocol (TKIP) to generate a new encryption key for each packet, enhancing security compared to WEP.

Wi-Fi Protected Access (WPA)

New cards
7

The successor to WPA, introduced in 2004. It supports the Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP), which is based on the AES encryption standard. It became the standard for wireless security for over a decade.

WPA2

New cards
8

The latest wireless security standard, released in 2018. IT increases the minimum key strength for enterprise mode connections and eliminates the use of passphrases for personal-mode networks. It also implements forward secrecy and encrypts management frames for improved security.

WPA3

New cards
9

A security standard that provides network access control at the port level, whether physical or wireless, and uses authentication based on the Extensible Authentication Protocol (EAP).

802.1x

New cards
10

An authentication standard used in 802.1x that provides a framework for various authentication methods, including username and password or public key infrastructure (PKI) certificates.

Extensible Authentication Protocol (EAP)

New cards
11

The process of controlling access to a network based on the authentication and authorization of users and devices.

Network Access Control

New cards
12

A protocol used in 802.1x authentication that allows for centralized authentication, authorization, and accounting for network access.

Remote Authentication Dial-In User Service (RADIUS)

New cards
13

Rules and criteria set by a network administrator that determine the level of access and privileges granted to a user or device on a network.

Authorization Policies

New cards
14

Software programs designed to detect and remove malicious software, such as viruses, worms, and trojans, from a computer system.

Malware Scanners

New cards
15

The set of guidelines, policies, and configurations established by a company to ensure consistency and security across its network and systems.

Corporate Standard

New cards
16

A denial-of-service (DoS) attack where the attacker forces clients off of a wireless network, even without being on the network themselves.

Deauth Attack

New cards
17

The latest security protocol for wireless networks that encrypts management packets, providing better defense against deauth attacks.

WPA3 Security

New cards
18

An attack where the attacker sets up a rogue wireless network without security or authentication, allowing them to intercept and modify unencrypted data.

Fake Access

New cards
19

A secure connection established between a device and a VPN service, encrypting all traffic sent and received over a wireless network.

VPN Tunnel

New cards
20

Public wireless networks that do not require authentication or encryption, posing a significant security risk and should be avoided.

Unsecured Wi-Fi Hotspots

New cards

Explore top notes

note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 38 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 105 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 72 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 67 people
Updated ... ago
5.0 Stars(3)

Explore top flashcards

flashcards Flashcard57 terms
studied byStudied by 33 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard71 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard67 terms
studied byStudied by 24 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard77 terms
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard38 terms
studied byStudied by 42 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard23 terms
studied byStudied by 18 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard24 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 284 people
Updated ... ago
5.0 Stars(6)