Lesson 14

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards
A Wi-Fi network that does not require a password or key to connect, making it accessible to anyone in the vicinity. Data transmitted on open networks is unencrypted and visible to anyone with a wireless network card.
Open Wi-Fi Network
2
New cards
An encryption algorithm that uses a 56-bit key to encrypt data. It is now considered antiquated and insecure, as it can be compromised by brute force methods in less than a day.
Data Encryption Standard (DES)
3
New cards
A symmetric encryption algorithm that uses the DES algorithm three times in a row to encrypt data. While it increases the complexity of encryption, it can still be compromised, especially as more data is sent in a single session.
Triple Data Encryption Standard (3DES)
4
New cards
A highly secure form of encryption widely used today. It can use a 128-bit, 192-bit, or 256-bit key, with longer key lengths providing stronger security.
Advanced Encryption Standard (AES)
5
New cards
An early wireless security standard that aimed to provide the same level of security as a wired network. It uses a 40-bit or 104-bit encryption key, which can be easily compromised using brute force methods. It has been deprecated and is no longer recommended.
Wired Equivalent Privacy (WEP)
6
New cards
A wireless security standard designed to overcome the weaknesses of WEP. It uses a variable-length alphanumeric passphrase and employs the Temporal Key Integrity Protocol (TKIP) to generate a new encryption key for each packet, enhancing security compared to WEP.
Wi-Fi Protected Access (WPA)
7
New cards
The successor to WPA, introduced in 2004. It supports the Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP), which is based on the AES encryption standard. It became the standard for wireless security for over a decade.
WPA2
8
New cards
The latest wireless security standard, released in 2018. IT increases the minimum key strength for enterprise mode connections and eliminates the use of passphrases for personal-mode networks. It also implements forward secrecy and encrypts management frames for improved security.
WPA3
9
New cards
A security standard that provides network access control at the port level, whether physical or wireless, and uses authentication based on the Extensible Authentication Protocol (EAP).
802\.1x
10
New cards
An authentication standard used in 802.1x that provides a framework for various authentication methods, including username and password or public key infrastructure (PKI) certificates.
Extensible Authentication Protocol (EAP)
11
New cards
The process of controlling access to a network based on the authentication and authorization of users and devices.
Network Access Control
12
New cards
A protocol used in 802.1x authentication that allows for centralized authentication, authorization, and accounting for network access.
Remote Authentication Dial-In User Service (RADIUS)
13
New cards
Rules and criteria set by a network administrator that determine the level of access and privileges granted to a user or device on a network.
Authorization Policies
14
New cards
Software programs designed to detect and remove malicious software, such as viruses, worms, and trojans, from a computer system.
Malware Scanners
15
New cards
The set of guidelines, policies, and configurations established by a company to ensure consistency and security across its network and systems.
Corporate Standard
16
New cards
A denial-of-service (DoS) attack where the attacker forces clients off of a wireless network, even without being on the network themselves.
Deauth Attack
17
New cards
The latest security protocol for wireless networks that encrypts management packets, providing better defense against deauth attacks.
WPA3 Security
18
New cards
An attack where the attacker sets up a rogue wireless network without security or authentication, allowing them to intercept and modify unencrypted data.
Fake Access
19
New cards
A secure connection established between a device and a VPN service, encrypting all traffic sent and received over a wireless network.
VPN Tunnel
20
New cards
Public wireless networks that do not require authentication or encryption, posing a significant security risk and should be avoided.
Unsecured Wi-Fi Hotspots