• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back

WEP

Wierd Equivalent Privacy. optional component of 802.11 designed to provide wireless connections with same security as wired connections. uses static PSKs.

PSK

Pre-shared keys. configured on access point in WEP. cannot be changed or exchanged without administration. Every host on network use same key. Because they dont change they can be captured and broken and alsoe asy to predict.

WPA

Wi-fi protected Access. security for 802.11i. Uses TKIP for encryption. supports both PSK and 802.1x. Can use dnamic keys or pre shared. can be implimented in WEP devices through software/firmware update.

Wy did WPA replace WEP?

uses TKIP

TKIP

Temporal Key Integrity Protocol. Periodically rotates keys.

WPA2

Uses advanced encryption standars (AES) as encryption method. Supports both pre shared key and 802.1x. can use dynamic or pre-shared keys.

AES

Advanced Encyrption Standard. supports key sizes of 128, 192, and 256 bits. similar and more secure than TKIP but requires special hardware for encryption.

802.1x

uses user and passoword, certificate, or devices liek smart cards to authenticate clients.

Good security practices.

Changing Admin name and password, change SSID from defaults, enabling MAC Address Filtering, disable DHCP.

SSID Suppression/Cloaking

Disabling SSID Broadcast. Cn still be hacked by analyzing wireless traffic.