1/15
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Securing Wireless Networks
Authenticate the users before granting access to an organization's wireless network. Encrypt wireless communication.
Wireless Encryption
Computers are encrypted with a special encryption in which only people with the right key and transmit and listen over the wireless network.
WiFi Protected Access (WPA)
Replacement for Wired Equivalent Privacy which uses TKIP, Message Integrity Check (MIC), and RC4 encryption.
WiFi Protected Access 2 (WPA2)
Used Advanced Encryption Standard that is a stronger encryption method than TKIP in WPA. Requires more CPU usage than TKIP.
WiFi Protected Access 3 (WPA3)
a newer cryptographic protocol that is designed to be more secure than WPA2. Provides encryption even on open networks.
Wireless Security Modes
Configure the authentication on your wireless access point.
Pre-Shared Key (PSK)
A password that allows users to connect to a wireless network.
802.1X
Authentication mode that requires users to login with their credentials and an access point uses a centralized database to confirm the user.
Authentication Process
Client sends a login request to VPN concentrator, VPN concentrator send request to authentication server, authentication server sends approval to VPN concentrator, VPN concentrator provides access to internal file server.
Authentication Authorization and Accounting (AAA)
A set of protocols that provides a framework to allow secure access and authorization as well as keep track of the user's activities on a computer network, including wireless networks.
Remote Authentication Dial-In User Service (RADIUS)
A protocol that is stored on a centralized authentication server for users.
Terminal Access Control Access Control System (TACACS)
An early form of authentication protocol that was created to control access to dial-up lines to early forms of the internet.
TACACS+
The latest version of TACACS that provides additional authentication capabilities and response codes. Commonly a Cisco device
Kerberos authentication
Network authentication protocol that allows the user to authenticate once, and the user is trusted by the system for a timeframe. Commonly a microsoft network
Authentication Communication
Communication is determined by what is at hand. VPN concentrator can only communicate to a specific authentication server on its network.
multifactor authentication (MFA)
A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories.