11. Wireless Network Security
0
0
115 Visningar·
10 September 2023
Part 11 of Computer Networking Fundamentals: Wireless Network Security
Wireless Network Security
At the end of this episode, I will be able to:
- Compare and contrast wireless security technologies.
Learner Objective: Compare and contrast wireless security technologies
Description: In this episode, the learner will explore a variety of wireless network security technologies.
- Introduction to Network Infrastructure
- Wireless Security
- WEP
- Weak or vulnerable to attack(Avoid)
- Uses a static key
- 64-bit or 128-bit key
- RC4 stream cipher
- CRC checksum
- WPA
- Weak or vulnerable to attack(Avoid)
- Uses Temporal Key Integrity Protocol
- Per-packet encryption
- RC4 stream cipher
- Message Integrity Check
- WPA2
- Stronger (Implement)
- Uses CCMP
- Counter Mode Cipher Block Chaining Message Authentication Code Protocol
- Advanced Encryption Standard
- 128-bit key
- WPA3
- Strongest
- Uses SAE
- 128-bit or 192-bit encryption
- WPS
- Push-button security
- Simplifies implementing security
- Weak or vulnerable to attack (Avoid)
- Disable
- Personal Mode
- WPA/WPA2/WPA3 implementation
- Requires no additional infrastructure
- Uses a preshared key or PSK (think password)
- Enterprise Mode
- WPA/WPA2/WPA3 implementation
- Requires additional infrastructure
- Utilizes 802.1X port-based authencation
- Requires a Remote Access Dial-in Server (RADIUS)
- MAC Filtering
- A security technique that identifies which wireless clients are allowed or denied access to the wireless network based on the client's media access control address.
- WEP
- Wireless Security
Visa mer
0 Kommentarer
sort Sortera efter