Please enable JavaScript.
Coggle requires JavaScript to display documents.
Understand Wireless Network Security (Identify types of wireless threats…
Understand Wireless Network Security
Identify components of Wireless Networks.
User Devices
Users of wireless LANs operate a multitude of devices, such as PCs, laptops, and PDAs. The use of wireless LANs to network stationary PCs is beneficial because of limited needs for wiring.
User devices might consist of specialized hardware as well.
Radio NICs
A major part of a wireless LAN includes a radio NIC that operates within the computer device and provides wireless connectivity.
A wireless LAN radio NIC, sometimes referred to as a radio card, often implements the 802.11 standard.
The cards generally implement one particular physical layer, such as 802.11a or 802.11b/g.
Access Points
An access point contains a radio card that communicates with individual user devices on the wireless LAN, as well as a wired NIC that interfaces to a distribution system, such as Ethernet.
System software within the access point bridges together the wireless LAN and distribution sides of the access point
Routers
A wireless LAN router adds a built-in access point function to a multiport Ethernet router.
This combines multiple Ethernet networks with wireless connections. A typical wireless LAN router includes four Ethernet ports, an 802.11 access point, and sometimes a parallel port so it can be a print server.
Repeaters
A network device for propagating wireless network signals beyond the typical boundary of a network.
Wireless repeater are generally passive devices and you can only bridge connections between the resident network and the host pursuing access to the network.
This is called increasing the network's stretchability
A wireless repeater may also be known as an expander
Antennae
Most antennae for wireless LANs are omnidirectional and have low gain
Omnidirectional antennae satisfy most coverage requirements; however, consider the use of optional directive antennae to cover a long, narrow area.
If a need exists to use a directive antenna (higher gain), ensure that the radio card or access point has an external antenna connector.
Identify types of wireless threats and attacks.
https://blog.ct-networks.io/types-of-wireless-attacks-9b6ecc3317b9
Rogue Wireless Devices
Peer-to-peer Attacks
Eavesdropping
Encryption Cracking
Authentication Attacks
MAC Spoofing
Management Interface Exploits
Wireless Hijacking
Denial of Service
Social Engineering
Identify Wireless Standard
802.11 Wireless Standards
802.11 represents the IEEE designation for wireless networking.
Wireless networking specifications exits under the 802.11, 802.11 a, 802.11b, 802.11g and 802.11n. All these standards use the Ethernet protocol and the CSMA/CA access method.