Wireless security checkpoint wk 8

Wireless security checkpoint wk 8 - Axia College Material...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Axia College Material Appendix F Wireless LAN Vulnerabilities Matrix Complete the following matrix by filling in the blank boxes. Security protection Brief description Vulnerabilities Prevention (if any) Mac address filtering Only allows devices that have that Mac address access to the network. Trying to manage a medium size network is very difficult, makes it easy for attackers to get in. Addresses are exchanged in plain text at first, it is easy for an attacker to see the address of an approved device. Allows for a substitute Mac address to be used. No prevention, not a widely used security protocal Open system authentication (SSID beaconing) Compares network SSID with device SSID, if they match then it is accepted. Shared key management, sends a challenge text, if device recodes and sends then the network accepts if it is a match. Based solely on an SSID match. Easy for an attacker to acquire SSID from device. SSID is beaconed so you can
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/08/2011 for the course IT 241 taught by Professor L.nichols during the Summer '10 term at University of Phoenix.

Page1 / 2

Wireless security checkpoint wk 8 - Axia College Material...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online