Learn Wireless Security (CompTIA Network+) with Interactive Flashcards
Master key concepts in Wireless Security through our interactive flashcard system. Click on each card to reveal detailed explanations and enhance your understanding.
WEP
Wired Equivalent Privacy (WEP) is a security protocol for wireless networks introduced in 1999. WEP aimed to provide security and privacy in wireless communication by encrypting data transmitted over the network. However, WEP's weak encryption and vulnerability to various attacks render it ineffective in today's cybersecurity landscape. WEP uses a 64-bit or 128-bit key that is shared between the sender and receiver. The encryption is based on the RC4 algorithm, which is not strong, and attackers can easily crack it with tools like Aircrack-ng. Using WEP is not recommended for securing wireless networks due to its deprecated and insecure nature, and organizations should opt for more advanced security protocols available.
WPA
Wi-Fi Protected Access (WPA) is a wireless security protocol that replaced WEP due to its security vulnerabilities. WPA offers enhanced security by introducing TKIP (Temporal Key Integrity Protocol), which generates a new key for each packet sent over the network, providing stronger encryption and protection against key cracking attacks. WPA also includes measures for a robust authentication process using RADIUS servers and EAP methods to validate users. Despite its improvements, WPA is not as secure as the later version, WPA2. Some WPA vulnerabilities have been discovered, and Wi-Fi technology advancements encouraged the creation of a more robust security protocol in the WPA2 standard.
WPA2
Wi-Fi Protected Access II (WPA2) is the most widely used wireless security protocol with significant improvements over its predecessor, WPA. WPA2 uses the more secure AES (Advanced Encryption Standard) algorithm for data encryption, which offers stronger protection against malicious attacks. WPA2 supports two main authentication modes: Personal (Pre-Shared Key) and Enterprise. In Personal mode, a single passphrase secures the wireless network, while Enterprise mode utilizes 802.1X authentication with a RADIUS server, providing a higher level of security for businesses. WPA2 has its vulnerabilities, such as KRACK, but patches have been released to address these issues. For most wireless networks, WPA2 is considered a secure option.
WPA3
Wi-Fi Protected Access III (WPA3) is the latest wireless security protocol, designed to provide stronger security and address vulnerabilities found in WPA2. WPA3 introduces several new features, such as SAE (Simultaneous Authentication of Equals) for replacing Pre-Shared Key, which enhances resistance to offline dictionary attacks. Moreover, WPA3 supports 192-bit encryption in its Enterprise variant, offering more robust security for high-security networks. Another essential feature is Opportunistic Wireless Encryption, which provides individual encryption to devices connected to open Wi-Fi networks without a central authentication server. Although WPA3 is not yet widely adopted, it is expected to become the new standard for wireless security in the future.
Rogue Access Points
Rogue Access Points are unauthorized wireless access points or routers added to a network without the knowledge or consent of the network administrator. These rogue access points create an easily exploitable entry point into a wireless network, allowing attackers to intercept traffic, steal sensitive data, or launch other malicious attacks. To protect against rogue access points, organizations should continuously monitor their networks for unauthorized devices, enforce strict security policies, use Wireless Intrusion Prevention Systems, segment network access and limit access privileges, and maintain updated firmware on all authorized access points.
Wireless Intrusion Prevention System (WIPS)
A Wireless Intrusion Prevention System (WIPS) is a network security solution that monitors wireless network traffic and protects it from potential threats. It helps to identify unauthorized access points, rogue devices, and other potential security threats while ensuring that wireless networks operate efficiently. WIPS also detects and mitigates attacks such as Denial of Service (DoS), cracking attempts, and unauthorized attempts to access the wireless network. By continuously monitoring the network for suspicious activities, WIPS ensures that businesses can maintain secure and efficient wireless connectivity without sacrificing data security or network performance.
Wi-Fi Protected Setup (WPS)
Wi-Fi Protected Setup (WPS) is a feature designed to make it easy for users to connect devices to a secure wireless network by using a PIN or pushing a button on the wireless router. Although it provides convenience, it has some security concerns, as it is vulnerable to brute-force attacks. Attackers can exploit this vulnerability to gain unauthorized access to the wireless network. To mitigate this risk, users should disable WPS on their routers or use stronger security protocols like WPA2 or WPA3.
RF Jamming
RF jamming refers to the process of disrupting or saturating wireless networks by deliberately transmitting strong radio frequency (RF) signals on the same frequencies that the targeted networks use. This can cause interference or overload the routers, making it difficult or impossible for legitimate signals to be received. RF jamming can be used as an attack vector to disrupt communication, to steal sensitive information, or to cripple the targeted network. Proper network security measures, such as analyzing RF traffic and monitoring for interference patterns, can help mitigate the impact of jamming attacks.
MAC Address Filtering
MAC address filtering is a security feature that allows network administrators to restrict access to a wireless network by allowing or blocking specific devices based on their hardware (MAC) addresses. While MAC address filtering can provide a basic level of security, it can be easily bypassed. Attackers can avert the filter by 'spoofing' an authorized MAC address, essentially impersonating an approved device to gain network access. Using a combination of security methods including strong encryption (WPA2, WPA3) and regular checks on authorized devices greatly enhances the security of any wireless network.
SSID Broadcasting
SSID broadcasting refers to the practice of transmitting the Service Set Identifier (SSID), which is the name of a wireless network, over the airwaves. It allows devices to automatically discover the network and connect. While it offers a convenience to users, SSID broadcasting can also pose a security risk, as it may attract unauthorized users or malicious attackers. To improve wireless security, network administrators can disable SSID broadcasting, requiring users to manually input the network name to connect. However, this method should not be relied upon as a sole security measure, as it can be bypassed using various tools; instead, it should be used in conjunction with encryption and other security protocols.
Go Premium
CompTIA Network+ Preparation Package (2024)
- 2881 Superior-grade CompTIA Network+ practice questions.
- Accelerated Mastery: Deep dive into critical topics to fast-track your mastery.
- Unlock Effortless CompTIA Network+ preparation: 5 full exams.
- 100% Satisfaction Guaranteed: Full refund with no questions if unsatisfied.
- Bonus: If you upgrade now you get upgraded access to all courses
- Risk-Free Decision: Start with a 7-day free trial - get premium features at no cost!