Preview

Appendix G

Satisfactory Essays
Open Document
Open Document
175 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Appendix G
Associate Level Material
Appendix G

Wireless LAN Vulnerabilities Matrix

Complete the following matrix by filling in the blank boxes in the table.

Security protection
Brief description
Vulnerabilities
Prevention (if any)
MAC address filtering
Allow or deny access traffic from mac addresses
Allowed client station addresses can be spoofed by any old hacker. This method is unreliable at best
None really
Open system authentication (SSID beaconing)
Cloak the ssid so that no one will pick up your network while they are scanning. Basically implements a closed network
Mixed vendor incompatibilities, sometimes misconfigured ssids, 2 layer wireless protocol analyzers can lead to a revealing of the ssid
As above none effective enough to mention
WEP
Standard wireless network security that runs on matching wep keys for example. Transmisions are also encrypted ahead of time as privacy is priority here.
These days there exist tools that can crack this open in about 5 minutes rendering it less than efficient. They use a combination of weak key, reinjection and bit flipping attacks
Ccmp encryption and tkpi are recommended in this situation

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 3 Summary

    • 734 Words
    • 3 Pages

    Although the Zigbee protocol implements the Advanced Encryption Standard (AES) protocol the initial key exchange is not protected against sniffing. The network keys are often exchanged in plain text or are encoded using the default factory key. Consequently, if an attacker were to sniff the initial exchange of packets, that attacker would be able to gain access to the network keys and the entire network. The difficulty with this type of attack is that the key exchange only occurs when a new node registers with the network. After this initial exchange all packets are encoded. The trick for these types of attacks, is forcing the network to enter an initialization state. This can be accomplished by creating RF interference that will result in dropped packets. After a certain number of dropped packets a wireless node will think that it has lost connection to the network and will try to reconnect. Then when this occurs the network key can be sniffed. These types of attacks have been carried out by a large number of security researchers [6, 7, 8, 9,…

    • 734 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT1210 LAb6.1

    • 401 Words
    • 2 Pages

    The information that it’s giving me is that its showing the wireless networks around my area. Most of them are routers.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1210 U6 Lab

    • 447 Words
    • 2 Pages

    The information that it’s giving me is that its showing the wireless networks around my area. A security key.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    |MAC address filtering |refers to a security access |While the restriction of network access|While giving a wireless |…

    • 572 Words
    • 3 Pages
    Good Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    All workstations will be hard wired directly to the network. Any laptop will be connect via a cloaked wifi network. This means it will display no SSID and only allow certain MAC address access to it. WPA 2 encryption will be used with a password system similar to what is covered in the security awareness section. All server rooms will have keycard access to allow only IT access to them.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix H

    • 278 Words
    • 2 Pages

    Use this document to report your findings from the LeafLab Exploration Experiment. The lab report consists of three sections: Data, Exploration, and Lab Summary.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network. true…

    • 602 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    "Six Things That Block Your Wi-Fi, and How to Fix Them." PCWorld. N.p., 20 Jan.…

    • 3783 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    You are also able to perform detective work with the help of router and will identify the devices and if you want you are able to find the settings of ‘Hide a network’ and your neighbors are unable to scan your connection and every time you connect the device you should need to enter the SSID manually.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Powerful Essays

    is3110 lab 5

    • 1037 Words
    • 5 Pages

    2. Which scanning application is better for performing a network discovery reconnaissance probing of an IP network infrastructure? inSSIDer is a Wi-Fi network scanner for the 32-bit and 64-bit versions of Windows XP, Vista, and 7. It is free and open source. The software uses the current wireless card or a wireless USB adapter and supports most GPS devices (namely those that use NMEA 2.3 or higher). Its graphical user interface shows MAC address, SSID, signal strength, hardware brand, security, and network type of nearby Wi-Fi networks. It can also track the strength of the signals and show them in a time graph.…

    • 1037 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    It-242 Wlan Check Point

    • 265 Words
    • 2 Pages

    There are several ways a person can go about securing a wireless local area network, or WLAN. One of the best ways in my opinion is to not broadcast the network publicly. This does not prevent people from accessing the network, but instead prevents the network from being visible to others. A person searching for a network to connect to can easily see your network exists. Without broadcasting the network people that are not aware of your network have no way of even knowing it is there. Another way to help to secure a WLAN is by using MAC address filtering. MAC filtering requires a list of the valid MAC addresses the user wants to be able to access the network. Any computer with a MAC address that is not on the provided list will not be able to gain access to the network. These steps alone are not enough to keep a network secure but when used with other security measures such as strong passwords and encryption can make a network a lot less accessible from malicious outsiders. These individuals can be a bothersome hindrance stealing network bandwidth or far more dangerous individuals that intend to cause harm with malicious programs or viruses or to steal private information. A wireless network may never be completely secure, but it is always best practice to use as many security steps as possible to insure the safety of the data on the network.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix F

    • 354 Words
    • 2 Pages

    |Young Adulthood |Most people here will reach |During this stage young adults |Here the young adult can develop|…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Appendix B

    • 289 Words
    • 2 Pages

    | Example: * Specialized psychology departments. 1. “Psychology departments grew and became more specialized, spawning professional specializations in such personally = related areas as clinical counseling, and industrial/organizational psychology.” 2. “Personality psychologist such as, Eysenck specialized in extraversion, Taylor in anxiety, and McClelland the need for achievernent.” 3. Carlson chastised personality psychologist for ignoring the grand theories of the earlier years and staying away from their implicit mandate to study real lives and whole persons in depth.” 4. “The phase began with critique and pervasive doubt concerning the legitimacy and worth of personality studies.”…

    • 289 Words
    • 2 Pages
    Good Essays