Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
21 Cards in this Set
- Front
- Back
892.1x |
The IEEE standard that defines port-based security for wireless network access control. |
|
AP |
Access Point. The point at which access to a network is accomplished. This term is often used in relation to wireless access point. |
|
Bluejacking |
The sending of unsolicited messages over a Bluetooth connection |
|
Bluesnarfing |
The gaining of unauthorized access through Bluetooth connection |
|
Disassociation |
An attack in which the Intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network. Also known as a deauthorization attack. |
|
Evil Twin |
An attack in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit. |
|
Interference |
A byproduct of electrical processes. One common form of interference is Radio Frequency Interference RFI, which is usually projected across the radio spectrum |
|
IV Attack |
Initialization Vector Attack. An attack that involves looking at repeated results in order to crack the WEP secret key |
|
Jamming |
Purposely obstructing or interfering with a signal |
|
NFC |
Near Field Communication. Technology that enables communication between devices when they're touched together. Often use to verify that the device is persistent. Often uses RFID or Wi-Fi |
|
RFID |
Radio Frequency Identification. It technology that incorporates the use of electromagnetic coupling in the radio frequency(RF) portion of the spectrum to identify items uniquely. |
|
Replay attack |
An attack that captures portions of a session to play back later to convince a host that it is still talking to the original connection |
|
Rouge Access Point |
An unauthorized wireless access point on a network |
|
SSID |
Service Set Identifier. Used by the access point of a wireless LAN to identify itself and is intended to be unique for a particular area / entity on a network. |
|
Wi-Fi |
A wireless network operating in the 2.4 gigahertz or 5 gigahertz range. |
|
WPS |
Wi-Fi protected setup. An Authentication process that requires the user to do something in order to complete the enrollment process. Examples include pressing a button on the router within a short time period, entering in pin, or bringing the new device close. |
|
WEP |
Wired Equivalent Privacy. A security protocol for 802.11b(wireless) networks that attempts to establish the same security for them as would be present in a wired Network. |
|
WAP |
Wireless Access Point. A connection device used for clients in a radio frequency Network. |
|
Cloaking |
Hiding and turning off SSID broadcasting. |
|
Site survey |
Listening in on an existing wireless network in order to gather intelligence and possibly captured data to learn information about the network. |
|
TKIP |
Temporal Key Integrity Protocol. Places a 128-bit wrapper around the WEP encryption with a key that is based on things such as the MAC address of the destination device and the serial number of the packet. |