2.2: Wireless Security Protocols and Authentication Methods

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

Wireless network security

Protect data confidentiality, restrict access to authorized users, encrypt transmissions, and verify data integrity.

2
New cards

Preventing wireless eavesdropping

Encrypt communications so only users with the correct key can send/receive data.

3
New cards

WPA2

Wireless security standard (2004) using CCMP with AES encryption and CBC-MAC for integrity.

4
New cards

WPA3

Wireless security standard (2018) using GCMP with AES encryption and GMAC for integrity.

5
New cards

WPA2 PSK vulnerability

Attackers can capture the 4-way handshake or derive the PSK hash without it, then brute force weak PSKs more easily using GPUs or cloud cracking; once cracked, they get the wireless key for everyone.

6
New cards

SAE in WPA3

Uses mutual authentication and Diffie-Hellman–derived keys to eliminate handshake-based brute-force attacks.

7
New cards

Wireless security modes

Open system (no password/authentication), WPA/2/3-Personal (PSK — same 256-bit key for all users), WPA/2/3-Enterprise (802.1X — individual authentication via a server such as RADIUS).

8
New cards

RADIUS

Centralized AAA protocol for devices like routers, switches, VPNs, and 802.1X networks; supported on most OSs.

9
New cards

TACACS protocols

Authentication protocol family; TACACS+ is an open standard with enhanced features, common on Cisco devices.

10
New cards

Kerberos

Network authentication protocol with SSO, mutual authentication, and replay/on-path attack protection; used in Microsoft networks since Windows 2000.

11
New cards

Kerberos SSO

Single authentication grants tickets for multiple resources without re-entering credentials.

12
New cards

Authentication method selection

VPN → RADIUS; Cisco devices → TACACS+; Microsoft networks → Kerberos.