1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Centralized Authentication Protocols
Used in businesses to authenticate users to WiFi, VPN, and other network resources
Radius (Remote Authentication Dial In User)
TASCAS+/CICIO (Terminal Access Controller Access-Control System)
Kerberos
Used on Windows to authenticate users in active directory; basically username/password
Multi factor
Combine multiple methods to increase the security of logins
WPA (WiFi Protected Access)
More secure than WEP but still vulnerable
Takes 15 minutes to crack it
Users authenticate using an alphanumeric passkey (PSK)
Encrypts with RC4 (Rivest Cipher 4)
WPA2
More secure than WEP and WPAv1
Users authenticate using PSK via CCMP
Encrypts with AES (Advance Encryption Standard)
WPA3
Most secure
Users authenticate with SAE (Simultaneous Authentication of Equals)
Combines PSK with user’s MAC address
Encrypts with AES (Advance Encryption Standard)