5.4 Understand Wireless Network Security (5.4.6 Secure a wireless…
5.4 Understand Wireless Network Security
5.4.7 Describe wireless security policy
• It is a subset of network security that adds protection for a wireless computer network.
• Wireless network security is also known as wireless security.
• Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network.
5.4.8 Implement security policy on wireless network
• To secure a network is to implement different layers of security so that an attacker must compromise two or more systems to gain access to critical assets.
• Security measures often restrict personnel in their operating practices and make some activities less convenient which results in a temptation to boost security regulations.
5.4 Understand wireless network security
5.4.1 Explain wireless network
Wireless networks are computer networks that are not connected by cables of any kind.
The use of a wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment location
5.4.2 Type pf wireless networks
Files can be shared directly between systems on the network without the need of a central server.
Each computer on a P2P network becomes a file server as well as a client.
Extension to wired network
Multiple wireless access to extend your home network. Connect two access point to the same network.same wireless network name n password.
Multiple access point
lug adapters can be used to extned a wired and wireless network
LAN-to-LAN wireless network
A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area.
A wireless wide area network (WWAN), is a form of wireless network.
personal area network
5.4.3 Identify components of wireless network
The use of wireless LANs to network stationary PCs is beneficial because of limited needs for wiring
a wireless LAN includes a radio NIC that operates within the computer device and provides wireless connectivity
Access point contains a radio card that communicates with individual user devices on the wireless
5.4.4 Types of wireless threats and attack
This can lead to stolen passwords or leaks of sensitive information quite easily
Rouge Access Point
These include vulnerability scans for attack preparation, ARP poisoning, packet captures, and Denial of Service attacks.
There are even ways to get around those es of wireless threats and attack
5.4.5 Wireless standard
Wireless-G & Wireless-N
Wireless-G and Wireless-N are terms referring to 802.11g and 802.11n wireless networking standards set by the IEEE.
The 802.11ac standard greatly improves nearly every aspect of Wireless-N
Wireless-AD is among the newest wireless standards to hit the consumer market
5.4.6 Secure a wireless communication using various techniques and tools
The process of encoding a message or information
Designed to detect and remove viruses from computers
Default router identifier
The router identifier is used by BGP and OSPF to identify the routing device from which a packe
Authentication technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.