Page 227 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 227
Avinash Bhagat, Lovely Professional University Unit 14: Authentication
Unit 14: Authentication Notes
CONTENTS
Objectives
Introduction
14.1 Concept of User Authentication
14.1.1 Importance of User Authentication
14.1.2 Creating Strong User Authentication
14.1.3 Approaches in User Authentication
14.1.4 Risk-Based Analytics
14.1.5 Compensating Controls
14.1.6 Emerging Megatrends Developments in the Online User-Authentication
Space
14.1.7 Authentication vs. Authorization
14.2 The 802.11 Authentication Vulnerabilities
14.2.1 Use of SSID
14.2.2 Open Authentication Vulnerabilities
14.2.3 Shared Key Authentication Vulnerabilities
14.2.4 MAC Address Authentication Vulnerabilities
14.3 Medium Access Control (MAC) Filters
14.4 Public-key Cryptography
14.4.1 How Public-key Cryptography Works
14.4.2 Putting Public Key Cryptography Together with Message Security
14.4.3 Public Key Cryptography and Digital Signatures
14.4.4 Public Key Cryptography and Message Encryption
14.4.5 Understanding How Public Key Cryptography in Digital Signatures and
Message Encryption Work Together
14.5 The 802.1X
14.6 Security Policies
14.6.1 Data Security Policy
14.6.2 End-User Security
14.7 Summary
14.8 Keywords
14.9 Review Questions
14.10 Further Readings
LOVELY PROFESSIONAL UNIVERSITY 221