null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
62246
Net Sec U8 - Wireless Networking
Description
Mind Map on Net Sec U8 - Wireless Networking, created by Nick.Bell2013 on 30/04/2013.
Mind Map by
Nick.Bell2013
, updated more than 1 year ago
More
Less
Created by
Nick.Bell2013
over 11 years ago
59
8
0
Resource summary
Net Sec U8 - Wireless Networking
Wireless LANs
vulnerabilities
anyone can receive
anyone can transmit
802.11
standards
Infrastructure mode
BSS
SSID
ESS
Ad-hoc mode
IBSS
physical layer
DSSS
data link layer
LLC
MAC
CSMA/CA
'hidden nodes
security issues
Access Point Roaming
Interception
War-driving
AP Config
Evil Twin APs
Rogue APs or Ad-hoc networks
Denial of Service
Hub Broadcasts
SKA
WEP
802.11b
weaknesses
Initialisation vector
WEP keys
weak
Brute forcing
beyond
802.1x
802.11i
Safeguards
untrusted LAN
Sec. policy & architecture
discover unauthorised use
AP Audits
station protection
AP Locations
MAC address locking
Bluetooth
Piconets & Scatternets
Architecture
connection states
active
sniff
hold
park
security modes
non-secure
service level enforced
link level enforced
link layer services
authentication of peer devices
confidentiality for transmitted data
initialisation link key
unit link key
combination & master link key
vulnerabilities
PINs
entry impractical
length
unit key reuse
unique addreses
Denial of Srv.
MitM attacks
only device authenticated
safeguards
Max PIN lengths
Policy
end-to-end security
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
CCNA Security 210-260 IINS - Exam 1
Mike M
CCNA Security 210-260 IINS - Exam 2
Mike M
SY0-401 Part 1 (50 questions)
desideri
CCNA Security 210-260 IINS - Exam 1
Ricardo Nuñez
CCNA Security 210-260 IINS - Exam 3
irvin pastora
1.3 Network and Security Components
DJ Perrone
U1. OSI 7 Layer Reference Model
Craig Parker
Types of Attacks
River L.
CCNA Security 210-260 IINS - Exam 1
irvin pastora
Network Security Vocabulary
Shantal K Green
Maximizing Efficiency: A Comprehensive Guide to Cloud Services for Your Business
Andrew James
Browse Library