Sec+ 09-10 Mobile Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

Wireless Network Security Attacks

Includes various methods used to exploit vulnerabilities in wireless networks, such as unauthorized access, data interception, and denial of service.

2
New cards

Bluetooth

A wireless technology that uses short-range radio frequency transmissions to allow devices to communicate over a personal area network.

3
New cards

Piconet

A small network with a master device controlling up to seven active slave devices, commonly seen in Bluetooth setups.

4
New cards

Scatternet

A network formed by connecting multiple piconets, allowing for communication between devices in different piconets.

5
New cards

Bluejacking

An attack that sends unsolicited messages to Bluetooth-enabled devices, considered more annoying than harmful.

6
New cards

Bluesnarfing

An attack that gains unauthorized access to data on a Bluetooth device, allowing the attacker to copy emails, contacts, or other data.

7
New cards

Near Field Communication (NFC)

A set of standards for smartphones and smart cards to establish communication between devices in close proximity, commonly used for contactless payment.

8
New cards

Eavesdropping

Intercepting communications between devices to steal sensitive data, requiring the attacker to be extremely close.

9
New cards

WEP (Wired Equivalent Privacy)

An outdated security protocol for wireless networks that uses weak encryption and is vulnerable to attacks due to short initialization vectors.

10
New cards

WPA (Wi-Fi Protected Access)

A security protocol designed to secure wireless networks, utilizing dynamic key generation and Temporal Key Integrity Protocol (TKIP) for encryption.

11
New cards

WPA2 (Wi-Fi Protected Access 2)

The second generation of WPA that utilizes Advanced Encryption Standard (AES) for stronger encryption and security.

12
New cards

BYOD (Bring Your Own Device)

A policy that allows employees to use their personal devices for work purposes, raising concerns about security and device management.

13
New cards

Device Loss or Theft

Risk associated with mobile devices, where losing the device can expose sensitive information to unauthorized users.

14
New cards

Mobile Device Management (MDM)

Tools and services that allow for remote management of mobile devices, including updates, security settings, and inventory control.

15
New cards

MAC Address Filtering

A security method that restricts access to a wireless network by permitting or blocking devices based on their MAC addresses.

16
New cards

SSID Broadcast

The process of transmitting the name of a wireless network, which can be intercepted by attackers if not properly secured.

17
New cards

Evil Twin

A rogue access point that masquerades as a legitimate access point to eavesdrop on wireless communications.

18
New cards

Firewalls

Security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.

19
New cards

Encryption

The process of converting plaintext into ciphertext to protect data from unauthorized access during transmission or storage.

20
New cards

Vulnerabilities in IEEE 802.11 Security

Weaknesses in the wireless standard that can be exploited, leading to various security attacks on wireless networks.

21
New cards

Captive Portal Access Points

A type of access point that requires users to agree to terms or provide credentials before granting access to the network.

22
New cards

Device Theft Prevention

Strategies to protect mobile devices from being stolen, including physical security measures and user awareness.

23
New cards

Network Interface Card (NIC)

A hardware component that connects a device to a network, capable of both wired and wireless connections.

24
New cards

WPA3 is the latest security protocol that aims to improve ________ and ________ in wireless networks.

security and encryption.

25
New cards

A ________ is a type of wireless network that uses a master device to control connections with slave devices.

piconet.

26
New cards

Bluetooth technology primarily operates in the ________ frequency range.

2.4 GHz.

27
New cards

________ can allow unauthorized users to intercept data during wireless communication.

Eavesdropping.

28
New cards

The process of hiding a network name from the public is called ________.

SSID hiding.

29
New cards

A security measure that ensures only authorized users can access a network is known as ________ authentication.

user.

30
New cards

The risk of ________ can occur when a device is lost or stolen, leading to data breaches.

device theft.

31
New cards

________ stands for Bring Your Own Device, referring to the practice of employees using personal devices for work.

BYOD.

32
New cards

A method implemented to control access to a wireless network by checking the ________ addresses of devices.

MAC.

33
New cards

Captive portal access points often require users to enter ________ before granting access to the internet.

credentials.

34
New cards

What is the purpose of WPA3 security protocol?

To improve security and encryption in wireless networks.

35
New cards

How many active slave devices can a master device control in a piconet?

Up to seven active slave devices.

36
New cards

What frequency range does Bluetooth technology operate in?

2.4 GHz.

37
New cards

What does eavesdropping refer to in wireless communications?

Intercepting communications between devices to steal sensitive data.

38
New cards

What is SSID hiding?

The process of concealing the name of a wireless network from the public.

39
New cards

What is user authentication?

A security measure ensuring only authorized users can access a network.

40
New cards

What risk is associated with device loss or theft?

Exposure of sensitive information to unauthorized users.

41
New cards

What does BYOD stand for?

Bring Your Own Device.

42
New cards

What does MAC address filtering restrict?

Access to a wireless network based on the MAC addresses of devices.

43
New cards

What is a captive portal access point?

An access point that requires users to agree to terms or provide credentials before accessing the network.