1/10
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
PSK
Shared key/password used on the WAP that must be used by endpoints to gain network access
Problems: fi we tell everyone the password, if someone leaves, they’ll still have access to it!
Can’t hold individual users accountable for actions as nobody’s signing in with unique identifiers
802.1X
Authentication protocol; used in both wired and wireless networks
Uses a central authentication server to manage user credentials
Ex. RADIUS or TACACS+
WEP
OG 802.11 security standard
Very insecure
Relies on RC4 (weak) and has the initialization vector (IV) vulnerability
NEVER use this for wireless security!!!
WPA
Uses TKIP, a slightly better but still insecure version of initialization vector
Also uses RC4, but uses Message Integrity Check (MIC) for extra protection
WPA2
Stronger integrity checking, better encryption, and overall better security
Uses CCMP for message integrity and AES for encryption
WPA3
Uses SAE: a password-based authentication and password-authenticated key agreement method
Enhances wi-fi authentication handshake method
WPS
Simplifies setup of secure wi-fi connections for non-technical users
Lets users connect to a network using a PIN with using a push button on the WAP/router, or by using NFC
Very insecure, disable this!!!!!
WPA Personal
Uses PSK, used in home networks
WPA Enterprise
Uses central authentication servers with username+passwords, used in enterprise networks
Yagi antenna
Directional antenna that can provide high gain
Very good over long distances in one direction
Parabolic antenna
A type of unidirectional antenna that curves
Like the one we have on our roof!