Ch9 - 9.02 - Securing a Wireless Network Flashcards

1
Q

Captive Portal

A

A common technique used by wireless hotspots is to configure a captive
portal, which forces a person to authenticate to the network via a web page
before Internet access is allowed. An organization can use a captive portal to
intercept all traffic destined for the Internet. Before allowing the traffic to
pass through the router, the user must either log on or at least accept the terms
of use. Implementing a captive portal is a great idea when you want to allow
visitors to your facility to have Internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Securing a wireless network:

A

+ Set a password for the admin account.
+ Change the SSID.
+ Disable SSID broadcasting.
+ Use MAC filtering.
+ Configure encryption with WPA2.
+ Place the access point in the center of the building.
+ Lower the power levels to control how far a wireless signal can travel.
+ Use a VPN solution for high-security environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data emanation

A

Electronic components always release emissions,
and someone could collect emissions from electrical components and
piece them together into readable data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Jamming/interference

A

As mentioned earlier, you could experience
interference on the wireless network from components such as cordless
phones. This is a security issue because interference can make the
wireless network go down, a violation of availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Packet sniffing

A

Anyone with a wireless network card and a sniffer
can easily capture wireless data. Be sure to encrypt all wireless
communication to protect confidential data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

War driving

A

War-driving is when someone drives around with a laptop and tries to locate
wireless networks that they can connect to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

War chalking

A

War-chalking. In war chalking, when someone discovers a wireless network, they
chalk a symbol outside the building notifying the rest of the war-driving
community that a wireless network is inside. With war chalking, different
symbols represent the configuration of the wireless network that was
discovered.

)(: Open Wireless Network
(): Closed Wireless Network
(W): WEP-enabled Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evil Twin - Rogue Access Point

A

A hacker can install a rogue access point from their wireless connection on
a laptop and make the laptop device appear to be a valid access point. This is
known as an evil twin, with the benefit to the hacker being that clients will
connect to the hacker’s fake access point, thinking it is a valid wireless
network. All data sent on this wireless network will be sent to the hacker’s
laptop, where they can capture and read the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly