Wi-Fi Protected Access (WPA), First version of WPA. Uses TKIP for encryption and enabled the use of the PSK. , Wi-Fi Protected Access 2 (WPA2), Upgraded version of the WPA security protocol. Uses AES for encryption and supports open, personal and enterprise authentication modes. , Wi-Fi Protected Access 3 (WPA3), Newest version of the WPA security protocol. Supports the SAE protocol, which is designed to reduce the likelihood of brute-force attacks and replay attacks. , Temporal Key Integrity Protocol (TKIP), Implemented with WPA. Uses longer encryption keys and is more secure than RC4, which was used with WEP. , Advanced Encryption Standard (AES), Strongest encryption algorithm available. Uses 128, 192, or 256 bit keys and is significantly harder to crack than RC4 and TKIP. , Remote Authentication Dial-In User Service (RADIUS), AAA protocol. Allows users to remotely login to an organization's network and access resources. Uses ports 1812 and 1813., Terminal Access Controller Access-Control System (TACACS+), Proprietary AAA protocol developed by Cisco. Used to remotely access the terminal on switches, routers, firewalls, etc. Runs on port 49. , Kerberos, Used to implement SSO in a domain network. Users are given a ticket that authenticates them to each service they wish to access. , Multifactor Authentication (MFA), The use of two or more authentication factors. , Encryption, The process of converting plaintext into ciphertext. This process protects our data from eavesdropping. , Plaintext, Human readable text., Ciphertext, Text that has been scrambled and is not readable by humans. , Symmetric Encryption, Describes any form of encryption where the same key is used encrypt/decrypt data. , Asymmetric Encryption, Describes any encryption where a public key is used to encrypt data and a private key is used to decrypt data. , Public Key, A key that is available to everyone. , Private Key, A secret key that is not shared. , MITM/On-Path Attack, An attack that is performed by eavesdropping on the communications between two entities. , Replay Attack , An attack performed by resubmitting login credentials, encryption keys, etc. in order to gain unauthorized access to something. , Encryption Algorithm, Method used to transform plaintext into ciphertext. , Wired Equivalent Privacy (WEP), The first security protocol developed for use with 802.11 networks. Uses the RC4 encryption algorithm and is susceptible to brute-force attacks. , Pre-Shared Key (PSK), A password, passphrase or PIN that allows users to access a wireless network. , Enterprise Mode Authentication, When enabled, allows a user to use RADIUS, TACACS+ or Kerberos protocols. , Open Mode Authentication, No security method. Allows anyone to join the network. , Brute Force Attack , An attack performed by repeatedly entering passwords until an attacker is successful. , Entropy , Describes the randomness of the encryption key., Simultaneous Authentication of Equals (SAE), Security protocol implemented in WPA3 that strengthens the shared key exchange and helps prevent MITM and replay attacks. .
0%
2.3: Wireless Security Protocols and Authentication Methods
Share
Share
Share
by
Joshuachase
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?