Net Sec U8 - Wireless Networking

Descripción

Mapa Mental sobre Net Sec U8 - Wireless Networking, creado por Nick.Bell2013 el 30/04/2013.
Nick.Bell2013
Mapa Mental por Nick.Bell2013, actualizado hace más de 1 año
Nick.Bell2013
Creado por Nick.Bell2013 hace más de 11 años
59
8

Resumen del Recurso

Net Sec U8 - Wireless Networking
  1. Wireless LANs
    1. vulnerabilities
      1. anyone can receive
        1. anyone can transmit
    2. 802.11
      1. standards
        1. Infrastructure mode
          1. BSS
            1. SSID
            2. ESS
            3. Ad-hoc mode
              1. IBSS
            4. physical layer
              1. DSSS
              2. data link layer
                1. LLC
                  1. MAC
                    1. CSMA/CA
                      1. 'hidden nodes
                      2. security issues
                        1. Access Point Roaming
                          1. Interception
                            1. War-driving
                              1. AP Config
                                1. Evil Twin APs
                                  1. Rogue APs or Ad-hoc networks
                                    1. Denial of Service
                                      1. Hub Broadcasts
                            2. SKA
                              1. WEP
                              2. 802.11b
                                1. weaknesses
                                  1. Initialisation vector
                                    1. WEP keys
                                      1. weak
                                        1. Brute forcing
                                      2. beyond
                                        1. 802.1x
                                          1. 802.11i
                                      3. Safeguards
                                        1. untrusted LAN
                                          1. Sec. policy & architecture
                                            1. discover unauthorised use
                                              1. AP Audits
                                                1. station protection
                                                  1. AP Locations
                                                    1. MAC address locking
                                                    2. Bluetooth
                                                      1. Piconets & Scatternets
                                                        1. Architecture
                                                          1. connection states
                                                            1. active
                                                              1. sniff
                                                                1. hold
                                                                  1. park
                                                                  2. security modes
                                                                    1. non-secure
                                                                      1. service level enforced
                                                                        1. link level enforced
                                                                        2. link layer services
                                                                          1. authentication of peer devices
                                                                            1. confidentiality for transmitted data
                                                                              1. initialisation link key
                                                                                1. unit link key
                                                                                  1. combination & master link key
                                                                                  2. vulnerabilities
                                                                                    1. PINs
                                                                                      1. entry impractical
                                                                                        1. length
                                                                                        2. unit key reuse
                                                                                          1. unique addreses
                                                                                            1. Denial of Srv.
                                                                                              1. MitM attacks
                                                                                                1. only device authenticated
                                                                                                2. safeguards
                                                                                                  1. Max PIN lengths
                                                                                                    1. Policy
                                                                                                      1. end-to-end security
                                                                                                    Mostrar resumen completo Ocultar resumen completo

                                                                                                    Similar

                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                    Mike M
                                                                                                    CCNA Security 210-260 IINS - Exam 2
                                                                                                    Mike M
                                                                                                    SY0-401 Part 1 (50 questions)
                                                                                                    desideri
                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                    Ricardo Nuñez
                                                                                                    CCNA Security 210-260 IINS - Exam 3
                                                                                                    irvin pastora
                                                                                                    1.3 Network and Security Components
                                                                                                    DJ Perrone
                                                                                                    U1. OSI 7 Layer Reference Model
                                                                                                    Craig Parker
                                                                                                    Types of Attacks
                                                                                                    River L.
                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                    irvin pastora
                                                                                                    Network Security Vocabulary
                                                                                                    Shantal K Green
                                                                                                    Maximizing Efficiency: A Comprehensive Guide to Cloud Services for Your Business
                                                                                                    Andrew James