200. Wireless Security Settings

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/41

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards

WEP

Wired Equivalent Privacy

2
New cards

Wired Equivalent Privacy

Outdated 1999 wireless security standard meant to match wired LAN security for wireless networks. Insecure and vulnerable to simple cryptographic attacks

3
New cards

64-bit WEP

Consists of 40 bits of actual key data plus an extra 24 bits of initialization vector

4
New cards

128-bit WEP

Includes 104 bits of key data and an additional 24 bits of initialization vector

5
New cards

Why is WEP insecure?

Weak 24-bit initialization vector

6
New cards

WPA

Wi-Fi Protected Access

7
New cards

Wi-Fi Protected Access

Introduced in 2003 as a temporary improvement over WEP while the more robust IEEE 802.11i standard was in development

8
New cards

TKIP

WPA uses this to improve upon WEP’s security. It generates new 128 bit keys

9
New cards

Why was WPA insecure?

Lack of sufficient data integrity checks in TKIP implementation

10
New cards

WPA2

Wi-Fi Protected Access 2

11
New cards

Wi-Fi Protected Access 2

Improved data protection and network access control by addressing weaknesses in WPA version

12
New cards

WPA2 replaced WPA’s TKIP with

The AES protocol and adopted CCMP for stronger encryption

13
New cards

CCMP

Counter Cipher Mode with Block Chaining Message Authentication Code Protocol

14
New cards

WPA2 provides

Stronger encryption and introduces Message Integrity Code (MIC) for integrity checking

15
New cards

WPA3

Wi-Fi Protected Access 3

16
New cards

Wi-Fi Protected Access 3

Latest version using AES encryption and introducing new features like SAE, Enhanced Open, updated cryptographic protocols, and management protection frames

17
New cards

SAE

Simultaneous Authentication of Equals

18
New cards

Simultaneous Authentication of Equals

Enhances security by offering a key establishment protocol to guard against offline dictionary attacks

19
New cards

OWE

Enhanced Open/Opportunistic Wireless Encryption

20
New cards

Enhanced Open/Opportunistic Wireless Encryption

Major advancement in wireless security, especially for networks using open authentication

21
New cards

Cryptogrpahic Protocol

Uses newer variant of AES known as the AES GCMP

22
New cards

GCMP

Galois COunter Mode Protocol

23
New cards

Galois Counter Mode Protocol

Supports 128-bit AES for personal networks and 192-bit AES for enterprise networks with WPA3

24
New cards

Management Protection Frames

Required to protect network from key recovery attacks

25
New cards

AAA

Authentication, Authorization, and Accounting Protocol

26
New cards

Authentication, Authorization, and Accounting Protocol

Plays a vital role in network security by centralizing user authentication to permit only authorized users to access network resources

27
New cards

RADIUS

Remote Authentication Dial-In User Service

28
New cards

Remote Authentication Dial-In User Service

Client/Server protocol offering AAA services for network users

29
New cards

TACAS+

terminal Access Controller Access-Control System Plus

30
New cards

terminal Access Controller Access-Control System Plus

Separates the functions of AAA to allow for a more granular control over processes

31
New cards

Authentication Protocols

Confirm user identity for network security and authorized access

32
New cards

EAP

Extensible Authentication Protocol

33
New cards

Extensible Authentication Protocol

Authentication framework that supports multiple authentication methods

34
New cards

PEAP

Protected Extensible Authentication Protocol

35
New cards

Protected Extensible Authentication Protocol

Authentication protocol that secures EAP within an encrypted and authenticated TLS tunnel

36
New cards

EAP-TTLS

Extensible Authentication Protocol-Tunneled Transport Layer Security

37
New cards

Extensible Authentication Protocol-Tunneled Transport Layer Security

Authentication protocol that extends TLS support across multiple platforms

38
New cards

EAP-TTLS vs PEAP: EAP-TTLS

Certificate (Server)

39
New cards

EAP-TTLS vs PEAP: PEAP

Certificate (server/client)

40
New cards

EAP-FAST

Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling

41
New cards

Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling

Developed by Cisco, it enables secure re-authentication while roaming within a network without full authentication each time

42
New cards

EAP-FAST was developed to replace

LEAP