Term
Personal Area Network (PAN) technology |
|
Definition
|
|
Term
|
Definition
Established when two Bluetooth devices come within range of each other – One device (master) controls all wireless traffic – Other device (slave) takes commands • Active slaves can send transmissions • Parked slaves are connected but not actively participating |
|
|
Term
|
Definition
Group of piconets with connections between different piconets |
|
|
Term
|
Definition
Attack that sends unsolicited messages to Bluetooth - enabled devices • Text messages, images, or sound |
|
|
Term
|
Definition
Unauthorized access to wireless information through a Bluetooth connection |
|
|
Term
|
Definition
Acts as “base station” for wireless network |
|
|
Term
|
Definition
Documenting and then advertising location of wireless LANs for others to use – Previously done by drawing on sidewalks or walls around network area – Today, locations are posted on Web sites |
|
|
Term
|
Definition
Attacks using access points Rogue access points AP setup by an attacker mimic authorized AP |
|
|
Term
|
Definition
Unauthorized access point that allows attacker to bypass network security configurations |
|
|
Term
|
Definition
Frame carries Service Set Identifier (SSID) • User - supplied network name • Can be any alphanumeric string 2 - 32 characters long |
|
|
Term
|
Definition
WEP can only use 64 - bit or 128 - bit number to encrypt • Initialization vector (IV) is only 24 of those bits • Short length makes it easier to break |
|
|
Term
Temporal Key Integrity Protocol ( TKIP ) |
|
Definition
Encryption – Used in WPA – Uses longer 128 bit key than WEP – Dynamically generated for each new packet WPA encryption technology |
|
|
Term
|
Definition
Proprietary method developed by Cisco Systems |
|
|
Term
|
Definition
Simplifies deployment of 802.1x by using Microsoft Windows logins and passwords – Creates encrypted channel between client and authentication server |
|
|
Term
|
Definition
wireless technology using short -range RF transmissions |
|
|
Term
|
Definition
Attackers can identify the existence of a wireless network using wireless location mapping using portable computing device |
|
|
Term
|
Definition
PAN, personal area network technology designed for data communication over short distances |
|
|
Term
|
Definition
2005, BASED ON Bluetooth v1.2 |
|
|
Term
2 types of Bluetooth Network topologies |
|
Definition
|
|
Term
|
Definition
a group of piconets in which connections exist between different piconets |
|
|
Term
|
Definition
speed: 600Mbps Coverage Area: The new standard doubles for indoor range and triples the outdoor range of coverage Interference: uses different frequencies to reduce interference Security: strongest level of security 2.4Ghz 0r 5Ghz |
|
|
Term
|
Definition
Combination of standards established in 2007 |
|
|
Term
1997: release of IEEE 802.11 |
|
Definition
Standard for wireless local area networks (WLANs) – Higher speeds added in 1999: IEEE 802.11b |
|
|
Term
|
Definition
Specifies maximum rated speed of 54Mbps using the 5GHz spectrum |
|
|
Term
|
Definition
Preserves stable and widely accepted features of 802.11b – Increases data transfer rates similar to 802.11a 2.4Ghz@54Mbps |
|
|
Term
Wireless client network interface card adapter |
|
Definition
performs same function as a wired adapter with one major exception, no external RJ-45 connection |
|
|
Term
|
Definition
An antenna and a radio transmitter/receiver to send and receive wireless signals special bridging software that allows to interface wireless devices to other devices a wired network interface that allows it to connect by cable to a standard wired network |
|
|
Term
|
Definition
Act as a base station act as a bridge between the wireless and wired networks |
|
|
Term
Standard AP's are known as |
|
Definition
|
|
Term
|
Definition
an AP sends a signal to announce its presence and to provide the necessary information for devices wishing to join the wireless network |
|
|
Term
|
Definition
orderly means for wireless devices to establish and maintain communications |
|
|
Term
|
Definition
each wireless device looks for those beacon frames |
|
|
Term
What are the entry points features of hardware devices from the internet into a wireless network? |
|
Definition
AP Firewall router Dynamic Host Configuration Protocol |
|
|
Term
wireless location mapping |
|
Definition
formal expression for this passive wireless discovery process of finding a WLAN signal |
|
|
Term
|
Definition
posting the location of discovered WLAN's on web sites |
|
|
Term
Attacks through RF spectrum |
|
Definition
wireless protocol analyzer generating interference |
|
|
Term
Attacks using Access Points |
|
Definition
rogue access points evil twins |
|
|
Term
3 Categories of vulnerabilities for the 802.11 |
|
Definition
MAC address filtering SSID broadcast Wired Equivalent Privacy (WEP) encryption |
|
|
Term
Media Access Control MAC address filtering |
|
Definition
method for controlling access to a WLAN based on the device's MAC address |
|
|
Term
Vulnerabilities of MAC address filtering |
|
Definition
exchanged between wireless devices and the AP in an unecrypted format
not practical because of large and dynamic wireless network |
|
|
Term
|
Definition
transmission of the SSID from the access point to a wireless device |
|
|
Term
WEP Wired Equivalent Privacy |
|
Definition
IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information |
|
|
Term
|
Definition
24 bit value used in WEP that changes each time a packet is encrypted |
|
|
Term
|
Definition
method of determining the keystream by analyzing 2 packets that were created from the same IV |
|
|
Term
|
Definition
"scrambling", format that cannot be viewed by unauthorized parties while being transmitted |
|
|
Term
WPA Wi-Fi Protected Access |
|
Definition
Protect both present and future wireless devices, address both encryption and authentication |
|
|
Term
WPA replaces_____with an encryption technology called TKIP |
|
Definition
|
|
Term
TKIP Temporal Key Integrity Protocol |
|
Definition
Per-packet keys, dynamically generates a new key for each packet that is created prevent collisions which were one of the primary weaknesses of WEP |
|
|
Term
PSK Preshared Key Authentication |
|
Definition
key must be created and entered into both the access point and all wireless devices prior to the devices communicating with the AP |
|
|
Term
AES-CCMP Encryption Advanced Encryption Standard |
|
Definition
blocks 128 bits encryption protocol standard for WPA2 |
|
|
Term
|
Definition
Counter Code with CBC-Mac of the AES encryption algorithm |
|
|
Term
|
Definition
Lightweight EAP Protected EAP |
|
|
Term
|
Definition
A propriety EAP method developed by CISCO Systems requiring mutual authentication used for WLAN encryption using Cisco Client software |
|
|
Term
|
Definition
An EAP method designed to simplify the deployment of 802.1x by using Microsoft Windows Logins and passwords |
|
|
Term
EAP Extensible Authentication Protocol |
|
Definition
A framework for transporting authentication protocols that defines the format of the messages |
|
|