13.1 - Wi-Fi

 13.1 - Wi-Fi 

 

Key Terms: 

    • Wi-Fi – A trademarked term meaning IEEE 802.11x. Wi-Fi allows devices to connect with each other wirelessly. 
    • Access point (AP) - A device that allows other wireless devices to connect to it. In home networks, the AP is in the router. 
    • Hotspot – A hotspot allows a wireless device to connect to the internet via a wireless portable device like a phone. 
    • Service set identifier (SSID) - A unique ID used to identify an access point. 
    • Open system authentication – A system that allows any device to connect to the wireless network. 
    • Pre-shared encryption – Each device that requires a wireless connection is installed with a software key that can be used to connect to the wireless network. 
    • Passphrase – A combination of letters, numbers, spaces and symbols that acts as a security key for connecting. 
    • Wired equivalent privacy (WEP) - An encryption technique based on RC4 encryption for wireless connections. 
    • Wi-Fi protected access (WPA) - A security standard for wireless networks. 
    • Temporal key integrity protocol (TKIP) - A security protocol used for mixing encryption keys before they are passed into a cipher. 
    • Message integrity code (MIC) - MIC values protect a message’s data integrity and authenticity by detecting any changes to message content. 
    • Counter mode cipher block chaining message authentication code protocol (CCMP) - An encryption protocol designed for wireless LAN products. 
    • Lightweight extensible authentication protocol (LEAP) - Created by Cisco, LEAP is an authentication type for wireless LANs. 
    • Protected extensible authentication protocol (PEAP) - PEAP is an authentication type for wireless connections. 
    • Wardriving – Using a car to drive around and locate wireless networks. 
    • MAC spoofing – Changing a network interface card’s media access control address to another MAC address to impersonate or disguise the source of transmission. 
    • Ad hoc networking – A network that has been established between two or more computers without using a pre-existing infrastructure. 
    • Evil twin – A rogue access point that appears to be legitimate but is set up to eavesdrop on wireless communications. 
    • Advanced encryption standard (AES) - A symmetric block cipher chosen by the U.S government to protect classified information. 

Comments

Popular posts from this blog

OSA Assignment 1 - Task 3 GUIDE

OSA Assignment 1 - Task 1 GUIDE

OSA Summer 2023 Mock - Task 1, Assignment 1