Please enable JavaScript.
Coggle requires JavaScript to display documents.
Pages 325-321 - Coggle Diagram
Pages 325-321
WEP (Wired Equivalent Privacy) offers two forms of unsecure authentication.
OSA (Open System Authentication) - No key is used at all. The wireless access client, knowing only the access point's SSID, requests authentication
SKA (Shared Key Authentication) - All wireless access clients use the same key, which can then be used to encrypt transmissions.
Disadvantages to WEP: Uses shared key for authenticating all users and for encrypting data makes it more susceptible to discovery than a dynamically generated, random, or single-use key
Quick fix: WPA(Wifi Protected Access)
Wireless Access Configuration in Enterprises
Consists of
Offboarding - Being able to remotely uninstall via remote wipe essential in BYOD environment
Consists of
Onboarding - Being able to remotely install, and view any possible security updates needed, essential to BYOD environment
SOHO router
Variables during installation
SSID
Security options such as type and credentials needed to associate with the AP
Administrator password
Whether or no DHCP and related options are used, most network administrators do not configure their wireless access point as a DHCP server and, in fact, doing so when another DHCP server is already designated will cause addressing problems on the network
How to reset a SOHO router
Continue holding down the button for at least 30 seconds ( varies for manufacturers
Release button; at this point, the router's values should be reset to the manufacturers defaults
Using the end of a paper clip, depress the reset button while you plug the power cable back in
Disconnect all data cables and unplug the power cable
802.11 protocol standards
Two solutions to the problem that standard 802.11 doesn't provide security
Encryption algorithms - Scrambled data transmitted over airwaves into a format that cannot easily be interpreted if the signal is intercepted.
Authentication - Allows a wireless client to log onto the network either by providing the correct password for the SSID or by providing user credentials that might be processed by an authentication server