Page 225 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 225

Unit 13: Wireless Networks Security




          Although its name implies that it is as secure as a wired connection, WEP has been demonstrated   Notes
          to have numerous flaws and has been deprecated in favor of newer standards such as WPA2.
          A virtual private network (VPN) extends a private network across a public network, such as
          the Internet.
          VPNs allow employees to securely access their company's intranet while traveling outside the
          office.
          VPNs provide security by the use of tunneling protocols and through security procedures such
          as encryption.
          13.9 Keywords


          Address Resolution Protocol (ARP): poisoning  is  a type of  attack where the Media  Access
          Control (MAC) address is changed by the attacker.

          Denial-Of-Service (DOS): occurs when an adversary causes a system or a network to become
          unavailable to legitimate users or causes services to be interrupted or delayed.
          Distributed Denial of Service attack): is a type of web attack that seeks to disrupt the normal
          function of the targeted computer network.
          Identity theft: (or MAC spoofing) occurs when a cracker is able to listen in on network traffic and
          identify the MAC address of a computer with network privileges.

          Manipulation: means that data has been inserted, deleted, or otherwise modified on a  system or
          during transmission.
          Masquerading: refers to the act of an adversary posing as a legitimate user in order to  gain access
          to a wireless network or a system served by the network.
          Repudiation: is when a user denies having performed an action on the network.
          Virtual  private  network  (VPN):  extends  a  private  networkacross  a  public  network,  such  as
          the Internet.
          Wired Equivalent Privacy  (WEP): is  a security  algorithm  for  IEEE  802.11  wireless  networks.
          Introduced as part of the original 802.11 standard ratified in September 1999, its intention was to
          provide data confidentiality comparable to that of a traditional wired network.
          Wireless security:  is the prevention of unauthorized access or damage to computers
          using wireless networks

          13.10 Review Questions


          13.   Describe denial of service.
          14.   Describe the concept of security threats
          15.   Explain the need for wireless security
          16.   Explain the procedure of traffic monitoring

          17.   What are the various types of protective actions?
          18.   What do you mean by unauthorized access
          19.   What is middle attacks?








                                           LOVELY PROFESSIONAL UNIVERSITY                                   219
   220   221   222   223   224   225   226   227   228   229   230