Page 263 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 263
Unit 14: Authentication
Internet Protocol: IP (Internet Protocol) is the primary network protocol used on the Internet, Notes
developed in the 1970s and is often used together with the Transport Control Protocol (TCP) and
referred to interchangeably as TCP/IP.
Knowledge-based authentication (KBA): Knowledge-based authentication (KBA) typically is
implemented as extensions to existing simple-password authentication.
Network Adapter: A network adapter interfaces a computer to a network.
Open Systems Interconnection Model (OSI): The OSI model defines internetworking in terms of
a vertical stack of seven layers.
Server-generated one-time passwords (OTPs): Server-generated one-time passwords (OTPs)
commonly are implemented as randomized password strings that are generated in real time
after verifying simple-password credentials.
User Authentication: User authentication is a means of identifying the user and verifying that the
user is allowed to access some restricted service.
14.9 Review Questions
1. Define User Authentication. Why is it important?
2. How will you create Strong User Authentication?
3. Discuss the approaches in User Authentication.
4. Distinguish between Authentication and Authorization.
5. Describe the process of 802.11 client authentication.
6. What are the vulnerabilities in the 802.11 Authentication.
7. Define Media Access Control.
8. How Public-key Cryptography Works?
9. Write brief note on Public Key Cryptography and Digital Signatures.
10. Describe Public Key Cryptography and Message Encryption.
11. Highlight the main parts of 802.1x Authentication.
12. Write short note on the security policies in authentication.
Answers: Self-Assessment
1. True 2. False
3. False 4. 802.11
5. Null
6. Shared key 7. False
8. True 9. True
10. Cryptography 11. Public
12. Private 13. True
14. True 15. False
16. Password 17. CAS
18. Data
LOVELY PROFESSIONAL UNIVERSITY 257