9781111640125_IM_ch08

Security+ Guide to Network Security Fundamentals

This preview shows page 5 - 8 out of 8 pages.

2. Note that WPA is a subset of 802.11i and addresses both encryption and authentication. 3. Explain that WPA replaces WEP with an encryption technology called Temporal Key Integrity Protocol (TKIP). 4. Discuss the advantages of TKIP over WEP. 5. Explain that WPA authentication can be accomplished by using either IEEE 802.1x or preshared key (PSK) technology. 6. Discuss the vulnerabilities that can result of improper management of the PSK keys including key management weaknesses and the use of passphrases. Wi-Fi Protected Access 2 (WPA2) 1. Define Wi-Fi Protected Access 2 (WPA2) as the second generation of WPA security introduced by the Wi-Fi Alliance in September 2004. WPA2 still uses PSK authentication but instead of TKIP encryption it uses enhanced data encryption. 2. Explain that encryption under the WPA2 personal security model is accomplished by AES-CCMP. CCMP is based upon the Counter Mode with CBC-MAC (CCM) of the Advanced Encryption Standard (AES) encryption algorithm. 3. Mention that CCM is the algorithm providing data privacy, while the Cipher Block Chaining Message Authentication Code (CBCMAC) component of CCMP provides data integrity and authentication. 4. Note that WPA2 authentication is accomplished through PSK or by the IEEE 802.1x standard. 5. Discuss the two common EAP protocols a. Lightweight EAP b. Protected EAP
Image of page 5

Subscribe to view the full document.

Security+ Guide to Network Security Fundamentals, Fourth Edition 8-6 Other Wireless Security Steps 1. Note that antenna placement, power level controls, and rogue AP discovery tools can be used to protect a wireless network. Quick Quiz 2 1. True or False: WPA replaces the Message Integrity Check (MIC) function in WEP with the Cyclic Redundancy Check (CRC). Answer: False 2. PSK authentication uses a(n) ____ to generate the encryption key. Answer: passphrase 3. The AES algorithm processes blocks of ____ bits. Answer: 128 4. True or False: Wireless VLANs allow a single access point to service different types of users. Answer: True Class Discussion Topics 1. Have students discuss how they would envision the devices that they own working together and how that might be done in a secure manner. 2. Have students discuss their experiences with Bluetooth hacking or having been hacked via Bluetooth. Additional Projects 1. Have students research recent developments from the WiFi Alliance, especially those related to the simultaneous use of peer-to-peer wireless devices while connected to an infrastructure mode device. Teaching Tip It is recommended that AES-CCMP encryption and decryption be performed in hardware because of its computationally intensive nature. Performing AES- CCMP encryption in software requires significant processing power. If an AP performed AES-CCMP encryption/decryption in software while serving several devices, the AP would not be able to adequately service the devices, especially if that access point lacked a powerful processor and a large amount of memory.
Image of page 6
Security+ Guide to Network Security Fundamentals, Fourth Edition 8-7 2. Have students research the debate over WiMax and LTE and the promise of “mobile broadband.” Additional Resources 1. IEEE 802.11 Wireless networks 2. Bluetooth 3. HIPAA and Wireless - compliance-and-wireless.html 4. WiFi Direct vs Bluetooth 4.0 remacy.html 5.
Image of page 7

Subscribe to view the full document.

Image of page 8
You've reached the end of this preview.
  • '
  • NoProfessor
  • Wireless Networks, Wi-Fi, wireless devices, WEP, Network Security Fundamentals

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern