This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Complete the following matrix by filling in the blank boxes. Security protection Brief description Vulnerabilities Preve Mac address filtering MAC address are give to devices and only those devices are allowed on the network Key management, steal MAC address, Spoof MAC address Firewall pos filter Open system authentication (SSID beaconing) Limits admission to the network and meant to only allow authorized users on the network Management difficult only needs the 1 SSID, brute force attacks, capture challenge text. View SSID, steal SSID, Dictionary attacks force any er request to g OK respons numerous 4 will make it m attacker to d valid and inv This is inform threw WEP Works on a secret key shared between the device and the access point. Weak key, keystream, RC4pseudo-random number firewall...
View Full Document
This note was uploaded on 09/22/2011 for the course IT241 it241 taught by Professor H during the Spring '11 term at University of Phoenix.
- Spring '11