Preview

IT-241 Appendix G

Satisfactory Essays
Open Document
Open Document
369 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT-241 Appendix G
Associate Program Material
Appendix G

Wireless LAN Vulnerabilities Matrix

Complete the following matrix by filling in the blank boxes in the table.

Security protection
Brief description
Vulnerabilities
Prevention (if any)
MAC address filtering
Only allows access to a device if its MAC address matches that of a pre-approved list on the router.
MAC Spoofing
Don’t rely on MAC filtering alone.
Open system authentication (SSID beaconing)
Disables SSID from being broadcast so wireless networks are harder to detect.
A spectrum analyzer can still be used to find the network name.
Create a more complex SSID and password settings in your AP
WEP
Stands for Wired Equivalency Privacy. Uses 64 bit or 128 bit encryption. (including 24-bit IV)
In larger networks, IV’s can be duplicated and cause collisions, which are easy to detect by outside influences
Use WPA2 with AES or similar instead on larger, enterprise deployments.

Of the six categories of attackers, the one I would most want to break into my network would be hackers, as they attempt to penetrate your network and expose vulnerabilities, then inform you of them. This is opposed to a cracker, which will do the same thing, only steal the data and attempt to sell it. A script kiddie is very dangerous, as they are generally under-experienced hackers and crackers who use someone else’s codes and almost always have malicious intent.

Between MAC filtering, WEP, and authentication, I believe that WEP is the most secure of the three. MAC filtering can be easily overcome by MAC spoofing, and is not part of the 802.11 standard. Authentication is somewhat weaker than WEP, as someone could capture the cleartext challenge phrase and the encrypted response frame and gain access to the network. WEP is the strongest of the 3, but is still weak due to IV collisions which can be monitored and the hacker can recover the security key during those collisions. In fact, hackers can even cause massive IV

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Acc 220 Appendix C

    • 336 Words
    • 2 Pages

    |Direct materials budget |An estimate of the quantity and cost of direct materials to be |Analyzes the amount of raw materials that a manufacturing |…

    • 336 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1210 U6 Lab

    • 447 Words
    • 2 Pages

    3. WLAN is used in home because there easier to maintain and to take care of it I could be private.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 210 Appendix I

    • 623 Words
    • 3 Pages

    Axia College Material Appendix I Currency Conversion Development Assignment—Flowcharts Complete the flowcharts for the assignment above by typing into the textboxes below. Control Flow Diagram—Main Control [pic] Control Flow Diagram—Display Menu | | |[pic] | Control Flow Diagram—Get_Int_Value | | |[pic] | Control Flow Diagram—Convert Currency | | |[pic] | Control Flow Diagram—Display_Results |[pic] | PSEUDOCODE Main Module Declare Selection as an integer Declare CurrencyType as string Declare USDollar as real Declare ConvertedAmount as real Call Display/Selection Module Call Canadian Module Call Mexican Module Call English Module Call Japanese Module Call French Module Call Quit Module Call Output Module End Program…

    • 623 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    TCP/IP reference model; includes all information as OSI but only has 5 layers and not 7, Layer 5 includes layers 5, 6 and 7 combines.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    |MAC address filtering |refers to a security access |While the restriction of network access|While giving a wireless |…

    • 572 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Glg 101 Appendix F

    • 517 Words
    • 3 Pages

    If, for the model in Figure 12.11, h1 were 506 ft, h2 were 497 ft, and l were 150 ft, what would be the hydraulic gradient (in percent) between well #1 and well #2?…

    • 517 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IT210 R5 Appendix D 2

    • 197 Words
    • 2 Pages

    Match the activity or purpose on the left with the appropriate description on the right by typing in the corresponding letter under the Answer column.…

    • 197 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    it238 r6 appendix c

    • 243 Words
    • 2 Pages

    window.alert("The file " + errURL + " generated the following error: " + errMessage + " on line " + errLineNum + ", and the caller is "+arguments.caller.toString());…

    • 243 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IT/210 Appendix D

    • 453 Words
    • 4 Pages

    Consider the Input and Output Process Example program in Appendix B, in which you developed what are often called system-level requirements: the basis for all subsequent analysis and design steps. The following steps will take these system-level requirements and refine them into a detailed blueprint for the program.…

    • 453 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Appendix C Hca 210

    • 372 Words
    • 2 Pages

    | |makes sure that they know what will be happening to them. | | |…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    Another way to protect your WLAN is with WPA (WI-FI Protected Access). WPA is an upgrade to the WEP(Wired Equivalent Privacy). WEP regulates access to wireless network through a devices hardware-specific MAC address.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    What is Authorization and how is this concept aligned with Identification and Authentication? Authorization is a set of rights defined for a subject and an object; this concept is aligned with Identification and Authentication because these are the 3 steps to the access control process…

    • 718 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Com/220 Appendix F

    • 353 Words
    • 2 Pages

    |persuasive essay? |explain why it’s important to use legal drugs for what they’re intended. |…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What type of attack is occurring when attackers gain access to otherwise restricted network resources, using a wireless network?…

    • 778 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix D CJS/240

    • 530 Words
    • 3 Pages

    Briefly review the discussions in the other two topics you did not choose for your first response on conversation starter 1. In a 200- to 300-word response, address the main points for and against the two controversial issues.…

    • 530 Words
    • 3 Pages
    Satisfactory Essays