Net Sec U8 - Wireless Networking

Descrição

Mapa Mental sobre Net Sec U8 - Wireless Networking, criado por Nick.Bell2013 em 30-04-2013.
Nick.Bell2013
Mapa Mental por Nick.Bell2013, atualizado more than 1 year ago
Nick.Bell2013
Criado por Nick.Bell2013 mais de 11 anos atrás
59
8

Resumo de Recurso

Net Sec U8 - Wireless Networking
  1. Wireless LANs
    1. vulnerabilities
      1. anyone can receive
        1. anyone can transmit
    2. 802.11
      1. standards
        1. Infrastructure mode
          1. BSS
            1. SSID
            2. ESS
            3. Ad-hoc mode
              1. IBSS
            4. physical layer
              1. DSSS
              2. data link layer
                1. LLC
                  1. MAC
                    1. CSMA/CA
                      1. 'hidden nodes
                      2. security issues
                        1. Access Point Roaming
                          1. Interception
                            1. War-driving
                              1. AP Config
                                1. Evil Twin APs
                                  1. Rogue APs or Ad-hoc networks
                                    1. Denial of Service
                                      1. Hub Broadcasts
                            2. SKA
                              1. WEP
                              2. 802.11b
                                1. weaknesses
                                  1. Initialisation vector
                                    1. WEP keys
                                      1. weak
                                        1. Brute forcing
                                      2. beyond
                                        1. 802.1x
                                          1. 802.11i
                                      3. Safeguards
                                        1. untrusted LAN
                                          1. Sec. policy & architecture
                                            1. discover unauthorised use
                                              1. AP Audits
                                                1. station protection
                                                  1. AP Locations
                                                    1. MAC address locking
                                                    2. Bluetooth
                                                      1. Piconets & Scatternets
                                                        1. Architecture
                                                          1. connection states
                                                            1. active
                                                              1. sniff
                                                                1. hold
                                                                  1. park
                                                                  2. security modes
                                                                    1. non-secure
                                                                      1. service level enforced
                                                                        1. link level enforced
                                                                        2. link layer services
                                                                          1. authentication of peer devices
                                                                            1. confidentiality for transmitted data
                                                                              1. initialisation link key
                                                                                1. unit link key
                                                                                  1. combination & master link key
                                                                                  2. vulnerabilities
                                                                                    1. PINs
                                                                                      1. entry impractical
                                                                                        1. length
                                                                                        2. unit key reuse
                                                                                          1. unique addreses
                                                                                            1. Denial of Srv.
                                                                                              1. MitM attacks
                                                                                                1. only device authenticated
                                                                                                2. safeguards
                                                                                                  1. Max PIN lengths
                                                                                                    1. Policy
                                                                                                      1. end-to-end security

                                                                                                    Semelhante

                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                    Mike M
                                                                                                    CCNA Security 210-260 IINS - Exam 2
                                                                                                    Mike M
                                                                                                    SY0-401 Part 1 (50 questions)
                                                                                                    desideri
                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                    Ricardo Nuñez
                                                                                                    CCNA Security 210-260 IINS - Exam 3
                                                                                                    irvin pastora
                                                                                                    1.3 Network and Security Components
                                                                                                    DJ Perrone
                                                                                                    U1. OSI 7 Layer Reference Model
                                                                                                    Craig Parker
                                                                                                    Types of Attacks
                                                                                                    River L.
                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                    irvin pastora
                                                                                                    Network Security Vocabulary
                                                                                                    Shantal K Green
                                                                                                    Maximizing Efficiency: A Comprehensive Guide to Cloud Services for Your Business
                                                                                                    Andrew James