Chapter 8 Study Guide 233

Chapter 8 Study Guide 233 - Chapter 8: Wireless Networks II...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 8: Wireless Networks II Identify the following WLAN security threats: drive-by hackers- sit outside a corporate premises and read network traffic/ can send malicious traffic into the network war drivers- Merely discover unprotected access points- become drive-by hackers only if they break in. Not illegal rogue APs- Unauthorized access points that are set up by a department or an individual/ Often have very poor security, making drive-by hacking easier evil twin APs- Attacker access point outside a building that attracts clients inside the building to associate with it What is WEP? A weak security mechanism for 802.11. Everyone shared the same secret encryption key and this key could not be changed automatically. Because secret key was shared, it does not seem to be secret. Key could be cracked in 1-2 hours initially, now can be cracked in 3-10 minutes using reasily available software. What does Molta mean when he says that WEP was broken before it was broken?
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/11/2012 for the course IST 233 taught by Professor Davidmolta during the Spring '09 term at Syracuse.

Page1 / 2

Chapter 8 Study Guide 233 - Chapter 8: Wireless Networks II...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online