Net Sec U8 - Wireless Networking

Description

Mind Map on Net Sec U8 - Wireless Networking, created by Nick.Bell2013 on 30/04/2013.
Nick.Bell2013
Mind Map by Nick.Bell2013, updated more than 1 year ago
Nick.Bell2013
Created by Nick.Bell2013 over 11 years ago
59
8

Resource summary

Net Sec U8 - Wireless Networking
  1. Wireless LANs
    1. vulnerabilities
      1. anyone can receive
        1. anyone can transmit
    2. 802.11
      1. standards
        1. Infrastructure mode
          1. BSS
            1. SSID
            2. ESS
            3. Ad-hoc mode
              1. IBSS
            4. physical layer
              1. DSSS
              2. data link layer
                1. LLC
                  1. MAC
                    1. CSMA/CA
                      1. 'hidden nodes
                      2. security issues
                        1. Access Point Roaming
                          1. Interception
                            1. War-driving
                              1. AP Config
                                1. Evil Twin APs
                                  1. Rogue APs or Ad-hoc networks
                                    1. Denial of Service
                                      1. Hub Broadcasts
                            2. SKA
                              1. WEP
                              2. 802.11b
                                1. weaknesses
                                  1. Initialisation vector
                                    1. WEP keys
                                      1. weak
                                        1. Brute forcing
                                      2. beyond
                                        1. 802.1x
                                          1. 802.11i
                                      3. Safeguards
                                        1. untrusted LAN
                                          1. Sec. policy & architecture
                                            1. discover unauthorised use
                                              1. AP Audits
                                                1. station protection
                                                  1. AP Locations
                                                    1. MAC address locking
                                                    2. Bluetooth
                                                      1. Piconets & Scatternets
                                                        1. Architecture
                                                          1. connection states
                                                            1. active
                                                              1. sniff
                                                                1. hold
                                                                  1. park
                                                                  2. security modes
                                                                    1. non-secure
                                                                      1. service level enforced
                                                                        1. link level enforced
                                                                        2. link layer services
                                                                          1. authentication of peer devices
                                                                            1. confidentiality for transmitted data
                                                                              1. initialisation link key
                                                                                1. unit link key
                                                                                  1. combination & master link key
                                                                                  2. vulnerabilities
                                                                                    1. PINs
                                                                                      1. entry impractical
                                                                                        1. length
                                                                                        2. unit key reuse
                                                                                          1. unique addreses
                                                                                            1. Denial of Srv.
                                                                                              1. MitM attacks
                                                                                                1. only device authenticated
                                                                                                2. safeguards
                                                                                                  1. Max PIN lengths
                                                                                                    1. Policy
                                                                                                      1. end-to-end security
                                                                                                    Show full summary Hide full summary

                                                                                                    Similar

                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                    Mike M
                                                                                                    CCNA Security 210-260 IINS - Exam 2
                                                                                                    Mike M
                                                                                                    SY0-401 Part 1 (50 questions)
                                                                                                    desideri
                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                    Ricardo Nuñez
                                                                                                    CCNA Security 210-260 IINS - Exam 3
                                                                                                    irvin pastora
                                                                                                    1.3 Network and Security Components
                                                                                                    DJ Perrone
                                                                                                    U1. OSI 7 Layer Reference Model
                                                                                                    Craig Parker
                                                                                                    Types of Attacks
                                                                                                    River L.
                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                    irvin pastora
                                                                                                    Network Security Vocabulary
                                                                                                    Shantal K Green
                                                                                                    Maximizing Efficiency: A Comprehensive Guide to Cloud Services for Your Business
                                                                                                    Andrew James