With this method all mac addresses are allowed by

Info icon This preview shows pages 42–43. Sign up to view the full content.

View Full Document Right Arrow Icon
second way is called explicit deny. With this method, all MAC addresses are allowed by default, and the list is instead used to deny specific MAC addresses. While open authentication is a type of security, it's not very secure. Open authentication can be very easily bypassed using MAC addresses spoofing. Shared Key Authentication 1:22-1:38 The second authentication method is shared key authentication. With shared key authentication,devices are asked to provide a password before they can connect to the wireless network. If they provide the correct password, they're allowed access. Shared key authentication uses a single password that needs to be configured on all devices. 802.1x Authentication 1:39-2:28 The third authentication method is called 802.1x authentication. 802.1x uses individual usernamesand passwords for authentication, much like the individual users on a computer. With 802.1x, users are asked to provide a username and a password. The authentication information is then sent to an authentication server which uses either RADIUS or EAP protocols. If the provided username and password are valid, then the connection is permitted. Authentication is only one layer of wireless security. And while it prevents unauthorized network connections, it doesn't protect the actual wireless transmissions. Remember, anyone in a range of the wireless network can capture the information being transmitted. Things like bank account numbers, credit card numbers, login credentials, these could all be very easily intercepted by a malicious individual. WEP 2:29-3:15 To protect against this, wireless networks use a second layer of security called encryption. Just as with authentication, there are several different methods of encryption that can be used on a wireless network. The first method we'll talk about is Wired Equivalent Privacy, or WEP. WEP uses an encryption method called RC4 to encrypt and decrypt communications. WEP can be used with open authentication or shared key authentication. When using shared key authentication,the shared key itself is used to encrypt communications. Now, WEP is a very unsecure encryption method. With even a simple hacking tool, a WEP encryption can be cracked in a matter of minutes. In fact, the only reason we're learning about WEP is to let you know to never use it, ever. It's just too risky. WPA 3:16-3:56 Let's take a look at the next encryption method, WPA. WPA was created as a temporary replacement of WEP until a better, more secure encryption method was developed. WPA still uses RC4 encryption, but it does so using a protocol called TKIP. TKIP uses a technique known as rotating keys, where a different encryption key is used for every packet being sent. This is in contrast to WEP, where the same key is used for all communications. Even though WPA TKIP does have some weaknesses, it is largely more effective than WEP. But remember, it was created as a temporary replacement until a more complex method was developed, which was WPA2.
Image of page 42

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 43
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern