Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
WEP |
Wierd Equivalent Privacy. optional component of 802.11 designed to provide wireless connections with same security as wired connections. uses static PSKs. |
|
PSK |
Pre-shared keys. configured on access point in WEP. cannot be changed or exchanged without administration. Every host on network use same key. Because they dont change they can be captured and broken and alsoe asy to predict. |
|
WPA |
Wi-fi protected Access. security for 802.11i. Uses TKIP for encryption. supports both PSK and 802.1x. Can use dnamic keys or pre shared. can be implimented in WEP devices through software/firmware update. |
|
Wy did WPA replace WEP? |
uses TKIP |
|
TKIP |
Temporal Key Integrity Protocol. Periodically rotates keys. |
|
WPA2 |
Uses advanced encryption standars (AES) as encryption method. Supports both pre shared key and 802.1x. can use dynamic or pre-shared keys. |
|
AES |
Advanced Encyrption Standard. supports key sizes of 128, 192, and 256 bits. similar and more secure than TKIP but requires special hardware for encryption. |
|
802.1x |
uses user and passoword, certificate, or devices liek smart cards to authenticate clients. |
|
Good security practices. |
Changing Admin name and password, change SSID from defaults, enabling MAC Address Filtering, disable DHCP. |
|
SSID Suppression/Cloaking |
Disabling SSID Broadcast. Cn still be hacked by analyzing wireless traffic. |