9781111640125_IM_ch08

Security+ Guide to Network Security Fundamentals

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 8-1 Chapter 8 Wireless Network Security At a Glance Instructor’s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional Projects Additional Resources Key Terms
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Fourth Edition 8-2 Lecture Notes Overview Wireless is convenient and in today’s network, it is quickly becoming the standard connection for many people. There are drawbacks to wireless, especially since the security of these networks has evolved very slowly. The chapter discusses the various vulnerabilities of various wireless protocols and some appropriate techniques for properly securing wireless networks. Chapter Objectives Describe the different types of wireless network attacks List the vulnerabilities in IEEE 802.11 security Explain the solutions for securing a wireless network Teaching Tips Wireless Attacks 1. Note that several attacks can be directed against wireless data systems. 2. Explain that these attacks can be directed against Bluetooth systems and wireless local area networks. Attacks on Bluetooth Devices 1. Define Bluetooth, which is the name given to a wireless technology that uses short- range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings. 2. Explain that Bluetooth technology enables users to connect wirelessly to a wide range of computing and telecommunications devices. 3. Emphasize that it provides for rapid “on the fly” ad hoc connections between a Bluetooth-enabled device such as a cellular smartphone or a laptop computer and a set of Bluetooth headphones or a mouse. 4. Refer to Table 8-1 to discuss different types of blue truth products. 5. Note that Bluetooth is a Personal Area Network (PAN) technology designed for data communication over short distances. 6. Discuss the two types of Bluetooth network topologies: piconet and scatternets.
Background image of page 2
Security+ Guide to Network Security Fundamentals, Fourth Edition 8-3 7. Explain that bluejacking is an attack that sends unsolicited messages to Bluetooth- enabled devices. 8. Note that bluesnarfing is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers. Wireless LAN Attacks 1. Discuss the evolution of the IEEE wireless networking standards. 2. Explain that a wireless client network interface card adapter performs the same functions as a wired adapter with one major exception: there is no external cable RJ-45 connection. 3. Discuss the three parts of an access point (AP): a. An antenna and a radio transmitter/receiver to send and receive wireless signals b. Special bridging software to interface wireless devices to other devices c. A wired network interface that allows it to connect by cable to a standard wired network 4. Discuss the basic functions of an AP.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 8

9781111640125_IM_ch08 - Security+ Guide to Network Security...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online