Preview

IT-241 Appendix G

Satisfactory Essays
Open Document
Open Document
369 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT-241 Appendix G
Associate Program Material
Appendix G

Wireless LAN Vulnerabilities Matrix

Complete the following matrix by filling in the blank boxes in the table.

Security protection
Brief description
Vulnerabilities
Prevention (if any)
MAC address filtering
Only allows access to a device if its MAC address matches that of a pre-approved list on the router.
MAC Spoofing
Don’t rely on MAC filtering alone.
Open system authentication (SSID beaconing)
Disables SSID from being broadcast so wireless networks are harder to detect.
A spectrum analyzer can still be used to find the network name.
Create a more complex SSID and password settings in your AP
WEP
Stands for Wired Equivalency Privacy. Uses 64 bit or 128 bit encryption. (including 24-bit IV)
In larger networks, IV’s can be duplicated and cause collisions, which are easy to detect by outside influences
Use WPA2 with AES or similar instead on larger, enterprise deployments.

Of the six categories of attackers, the one I would most want to break into my network would be hackers, as they attempt to penetrate your network and expose vulnerabilities, then inform you of them. This is opposed to a cracker, which will do the same thing, only steal the data and attempt to sell it. A script kiddie is very dangerous, as they are generally under-experienced hackers and crackers who use someone else’s codes and almost always have malicious intent.

Between MAC filtering, WEP, and authentication, I believe that WEP is the most secure of the three. MAC filtering can be easily overcome by MAC spoofing, and is not part of the 802.11 standard. Authentication is somewhat weaker than WEP, as someone could capture the cleartext challenge phrase and the encrypted response frame and gain access to the network. WEP is the strongest of the 3, but is still weak due to IV collisions which can be monitored and the hacker can recover the security key during those collisions. In fact, hackers can even cause massive IV

You May Also Find These Documents Helpful

  • Good Essays

    Eth 125 Appendix F

    • 510 Words
    • 3 Pages

    White Privilege- a way of conceptualizing racial inequalities that focuses as much on the advantages that white people accrue from society as on the disadvantages that people of color experience…

    • 510 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Com/220 Appendix F

    • 353 Words
    • 2 Pages

    |persuasive essay? |explain why it’s important to use legal drugs for what they’re intended. |…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Appendix E Hca 240

    • 559 Words
    • 3 Pages

    | | |The immune system attacks and destroys beta |genetics, geography, type I diabetes seems to|sustain life (Zelman, Tompary, Raymond, |…

    • 559 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    it238 r6 appendix c

    • 243 Words
    • 2 Pages

    window.alert("The file " + errURL + " generated the following error: " + errMessage + " on line " + errLineNum + ", and the caller is "+arguments.caller.toString());…

    • 243 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 210 Appendix I

    • 623 Words
    • 3 Pages

    Axia College Material Appendix I Currency Conversion Development Assignment—Flowcharts Complete the flowcharts for the assignment above by typing into the textboxes below. Control Flow Diagram—Main Control [pic] Control Flow Diagram—Display Menu | | |[pic] | Control Flow Diagram—Get_Int_Value | | |[pic] | Control Flow Diagram—Convert Currency | | |[pic] | Control Flow Diagram—Display_Results |[pic] | PSEUDOCODE Main Module Declare Selection as an integer Declare CurrencyType as string Declare USDollar as real Declare ConvertedAmount as real Call Display/Selection Module Call Canadian Module Call Mexican Module Call English Module Call Japanese Module Call French Module Call Quit Module Call Output Module End Program…

    • 623 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Appendix D CJS/240

    • 530 Words
    • 3 Pages

    Briefly review the discussions in the other two topics you did not choose for your first response on conversation starter 1. In a 200- to 300-word response, address the main points for and against the two controversial issues.…

    • 530 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix B Bus/210

    • 260 Words
    • 2 Pages

    | |Ensuring that all functions of the business are being ran to the best of company’s |…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix E Hca 240

    • 329 Words
    • 2 Pages

    There aren’t many known risk factors for type 1 diabetes through researchers continue to find new possibilities. Some known risk factors include: your family history, Genetics, the presence of certain genes indicates an increase risk developing type 1 diabetes and finally geography.…

    • 329 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Appendix E

    • 426 Words
    • 2 Pages

    | This source points out different ways to maintain a healthy life. It also shows what kinds of things a person can do to eat healthier.…

    • 426 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    TCP/IP reference model; includes all information as OSI but only has 5 layers and not 7, Layer 5 includes layers 5, 6 and 7 combines.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    What is Authorization and how is this concept aligned with Identification and Authentication? Authorization is a set of rights defined for a subject and an object; this concept is aligned with Identification and Authentication because these are the 3 steps to the access control process…

    • 718 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Appendix G

    • 486 Words
    • 2 Pages

    • Was there anything in either the University of Phoenix Student Code of Conduct or the Student Code of Academic Integrity that surprised you? If so, what was it? Why were you surprised? If not, why not?…

    • 486 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What type of attack is occurring when attackers gain access to otherwise restricted network resources, using a wireless network?…

    • 778 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It210 Appendix F

    • 372 Words
    • 3 Pages

    3. The main user screen should have a short description saying how to use the program.…

    • 372 Words
    • 3 Pages
    Satisfactory Essays