Page 263 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 263

Unit 14: Authentication




          Internet Protocol: IP (Internet Protocol) is the primary network protocol used on the Internet,   Notes
          developed in the 1970s and is often used together with the Transport Control Protocol (TCP) and
          referred to interchangeably as TCP/IP.
          Knowledge-based authentication  (KBA):  Knowledge-based  authentication (KBA)  typically is
          implemented as extensions to existing simple-password authentication.
          Network Adapter: A network adapter interfaces a computer to a network.
          Open Systems Interconnection Model (OSI): The OSI model defines internetworking in terms of
          a vertical stack of seven layers.
          Server-generated one-time passwords (OTPs):  Server-generated  one-time  passwords  (OTPs)
          commonly are implemented as randomized password strings that are generated in real time
          after verifying simple-password credentials.
          User Authentication: User authentication is a means of identifying the user and verifying that the
          user is allowed to access some restricted service.

          14.9 Review Questions


          1.   Define User Authentication. Why is it important?
          2.   How will you create Strong User Authentication?
          3.   Discuss the approaches in User Authentication.
          4.   Distinguish between Authentication and Authorization.

          5.   Describe the process of 802.11 client authentication.
          6.   What are the vulnerabilities in the 802.11 Authentication.
          7.   Define Media Access Control.
          8.   How Public-key Cryptography Works?
          9.   Write brief note on Public Key Cryptography and Digital Signatures.

          10.   Describe Public Key Cryptography and Message Encryption.
          11.   Highlight the main parts of 802.1x Authentication.
          12.   Write short note on the security policies in authentication.

          Answers: Self-Assessment

          1.   True                                  2.   False
          3.   False                                 4.   802.11

          5.   Null
          6.   Shared key                            7.   False
          8.   True                                  9.   True
          10.  Cryptography                          11.  Public
          12.  Private                               13.  True

          14.  True                                  15.  False
          16.  Password                              17.  CAS
          18.  Data



                                           LOVELY PROFESSIONAL UNIVERSITY                                   257
   258   259   260   261   262   263   264   265