2.2: Wireless Security Protocols and Authentication Methods

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Wireless network security

Protects Wi-Fi data confidentiality by controlling access and encrypting traffic; uses standards like WEP, WPA, WPA2, WPA3, with WPA3 being the most secure; best practices include strong passwords, disabling WPS, and changing defaults.

2
New cards

Wireless Eavesdropping

Unauthorized interception of Wi-Fi traffic; easy on open networks, harder on encrypted ones; prevented by using WPA2/WPA3 security and VPNs. Encrypt communications so only users with the correct key can send/receive data.

3
New cards

WEP (Wired Equivalent Privacy)

Early Wi-Fi security using RC4; weak, easily cracked, not secure.

It aims to provide a level of security comparable to wired networks but has significant vulnerabilities. It is largely outdated and has been replaced by stronger protocols.

4
New cards

WPA (Wi-Fi Protected Access)

A security protocol designed to improve upon WEP by providing stronger data protection and network access control. WPA uses TKIP for encryption and enhances security measures compared to its predecessor. It is now outdated and vulnerable.

5
New cards

WPA2

An enhanced version of WPA that uses AES encryption with CCMP for stronger security, providing better data protection and network integrity. It is widely used and considered secure compared to earlier protocols.

6
New cards

WPA3

The latest Wi-Fi security protocol that builds on the previous one, offering improved encryption methods via the SAE handshake and enhanced security features such as stronger protections against brute-force attacks. It is the strongest Wi-Fi protection.

7
New cards

PSK vulnerability

Weakness in WPA/WPA2-Personal where attackers can capture the 4-way handshake between a client and access point, then brute-force the shared Wi-Fi password via GPUs or cloud cracking.

Mitigated with strong passphrases, WPA3 SAE, or enterprise authentication.

8
New cards

SAE (Simultaneous Authentication of Equals)

WPA3 key exchange method replacing PSK; prevents offline brute-force attacks and provides forward secrecy using the Dragonfly handshake.

9
New cards

Wireless security modes

Options include Open (no security), WEP (outdated), WPA/WPA2-Personal with shared PSK, WPA/WPA2/WPA3-Enterprise with RADIUS authentication, and WPA3-Personal with SAE for the strongest protection.

10
New cards

RADIUS

Authentication protocol providing centralized AAA services for devices like routers, switches, VPNs, and 802.1X networks

Used in WPA2/WPA3-Enterprise to give each user unique login credentials instead of a shared PSK.

An open standard that uses UDP and encrypts only passwords

11
New cards

TACACS protocols

Cisco-proprietary AAA protocol using TCP; encrypts all authentication data and separates authentication, authorization, and accounting for granular control of network device access.

12
New cards

Kerberos

Network authentication protocol using encrypted tickets from a Key Distribution Center (KDC) to provide secure, mutual authentication, replay/on-path attack protection, and single sign-on in Microsoft Windows domains.

13
New cards

Kerberos SSO

Single Sign-On system where a user logs in once, receives a ticket-granting ticket (TGT), and uses it to access multiple network services securely without re-entering credentials.

14
New cards

Authentication method selection

VPN → RADIUS; Cisco devices → TACACS+; Microsoft networks → Kerberos.