Page 225 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 225
Unit 13: Wireless Networks Security
Although its name implies that it is as secure as a wired connection, WEP has been demonstrated Notes
to have numerous flaws and has been deprecated in favor of newer standards such as WPA2.
A virtual private network (VPN) extends a private network across a public network, such as
the Internet.
VPNs allow employees to securely access their company's intranet while traveling outside the
office.
VPNs provide security by the use of tunneling protocols and through security procedures such
as encryption.
13.9 Keywords
Address Resolution Protocol (ARP): poisoning is a type of attack where the Media Access
Control (MAC) address is changed by the attacker.
Denial-Of-Service (DOS): occurs when an adversary causes a system or a network to become
unavailable to legitimate users or causes services to be interrupted or delayed.
Distributed Denial of Service attack): is a type of web attack that seeks to disrupt the normal
function of the targeted computer network.
Identity theft: (or MAC spoofing) occurs when a cracker is able to listen in on network traffic and
identify the MAC address of a computer with network privileges.
Manipulation: means that data has been inserted, deleted, or otherwise modified on a system or
during transmission.
Masquerading: refers to the act of an adversary posing as a legitimate user in order to gain access
to a wireless network or a system served by the network.
Repudiation: is when a user denies having performed an action on the network.
Virtual private network (VPN): extends a private networkacross a public network, such as
the Internet.
Wired Equivalent Privacy (WEP): is a security algorithm for IEEE 802.11 wireless networks.
Introduced as part of the original 802.11 standard ratified in September 1999, its intention was to
provide data confidentiality comparable to that of a traditional wired network.
Wireless security: is the prevention of unauthorized access or damage to computers
using wireless networks
13.10 Review Questions
13. Describe denial of service.
14. Describe the concept of security threats
15. Explain the need for wireless security
16. Explain the procedure of traffic monitoring
17. What are the various types of protective actions?
18. What do you mean by unauthorized access
19. What is middle attacks?
LOVELY PROFESSIONAL UNIVERSITY 219