Preview

IT-241 Appendix G

Satisfactory Essays
Open Document
Open Document
369 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT-241 Appendix G
Associate Program Material
Appendix G

Wireless LAN Vulnerabilities Matrix

Complete the following matrix by filling in the blank boxes in the table.

Security protection
Brief description
Vulnerabilities
Prevention (if any)
MAC address filtering
Only allows access to a device if its MAC address matches that of a pre-approved list on the router.
MAC Spoofing
Don’t rely on MAC filtering alone.
Open system authentication (SSID beaconing)
Disables SSID from being broadcast so wireless networks are harder to detect.
A spectrum analyzer can still be used to find the network name.
Create a more complex SSID and password settings in your AP
WEP
Stands for Wired Equivalency Privacy. Uses 64 bit or 128 bit encryption. (including 24-bit IV)
In larger networks, IV’s can be duplicated and cause collisions, which are easy to detect by outside influences
Use WPA2 with AES or similar instead on larger, enterprise deployments.

Of the six categories of attackers, the one I would most want to break into my network would be hackers, as they attempt to penetrate your network and expose vulnerabilities, then inform you of them. This is opposed to a cracker, which will do the same thing, only steal the data and attempt to sell it. A script kiddie is very dangerous, as they are generally under-experienced hackers and crackers who use someone else’s codes and almost always have malicious intent.

Between MAC filtering, WEP, and authentication, I believe that WEP is the most secure of the three. MAC filtering can be easily overcome by MAC spoofing, and is not part of the 802.11 standard. Authentication is somewhat weaker than WEP, as someone could capture the cleartext challenge phrase and the encrypted response frame and gain access to the network. WEP is the strongest of the 3, but is still weak due to IV collisions which can be monitored and the hacker can recover the security key during those collisions. In fact, hackers can even cause massive IV

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT210 R5 appendix b

    • 191 Words
    • 2 Pages

    The following example explains how to write a program that calculates the cost of painting a room. If the user provides the price of a gallon of paint; the number of square feet one gallon of paint covers; and the length, height, and width of the room, you can calculate the total cost of painting the room.…

    • 191 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Acc 220 Appendix C

    • 336 Words
    • 2 Pages

    |Direct materials budget |An estimate of the quantity and cost of direct materials to be |Analyzes the amount of raw materials that a manufacturing |…

    • 336 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 210 Appendix I

    • 623 Words
    • 3 Pages

    Axia College Material Appendix I Currency Conversion Development Assignment—Flowcharts Complete the flowcharts for the assignment above by typing into the textboxes below. Control Flow Diagram—Main Control [pic] Control Flow Diagram—Display Menu | | |[pic] | Control Flow Diagram—Get_Int_Value | | |[pic] | Control Flow Diagram—Convert Currency | | |[pic] | Control Flow Diagram—Display_Results |[pic] | PSEUDOCODE Main Module Declare Selection as an integer Declare CurrencyType as string Declare USDollar as real Declare ConvertedAmount as real Call Display/Selection Module Call Canadian Module Call Mexican Module Call English Module Call Japanese Module Call French Module Call Quit Module Call Output Module End Program…

    • 623 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Computer A is trying to send information to Computer B, the IP address must see the advertisement from Computer B for the router to know where to send the information. The router then…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    |MAC address filtering |refers to a security access |While the restriction of network access|While giving a wireless |…

    • 572 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    6. To access the routers configuration, open a web browser and type in the wireless routers web address, the web address is usually provided by the manufacturer or type 192.168.1.1 and enter the administrator user…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    It244 Appendix.D

    • 929 Words
    • 4 Pages

    Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. Disaster recovery is a subset of business continuity. While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions.…

    • 929 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    IT210 R5 Appendix D 2

    • 197 Words
    • 2 Pages

    Match the activity or purpose on the left with the appropriate description on the right by typing in the corresponding letter under the Answer column.…

    • 197 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IT/210 Appendix D

    • 453 Words
    • 4 Pages

    Consider the Input and Output Process Example program in Appendix B, in which you developed what are often called system-level requirements: the basis for all subsequent analysis and design steps. The following steps will take these system-level requirements and refine them into a detailed blueprint for the program.…

    • 453 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    Of the many ways to protect your WLAN you should start with changing all the default passwords on all your equipment. If you have a small business without many users and devices a MAC filtering system is a good choice. MAC filtering is where every MAC address for all devices allowed on the system are listed and if a device tries to get onto the system that is not on the list it will not be allowed. That is why smaller systems can keep up with this type of format.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix C Hca 210

    • 372 Words
    • 2 Pages

    | |makes sure that they know what will be happening to them. | | |…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    What is Authorization and how is this concept aligned with Identification and Authentication? Authorization is a set of rights defined for a subject and an object; this concept is aligned with Identification and Authentication because these are the 3 steps to the access control process…

    • 718 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Com/220 Appendix F

    • 353 Words
    • 2 Pages

    |persuasive essay? |explain why it’s important to use legal drugs for what they’re intended. |…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What type of attack is occurring when attackers gain access to otherwise restricted network resources, using a wireless network?…

    • 778 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix D CJS/240

    • 530 Words
    • 3 Pages

    Briefly review the discussions in the other two topics you did not choose for your first response on conversation starter 1. In a 200- to 300-word response, address the main points for and against the two controversial issues.…

    • 530 Words
    • 3 Pages
    Satisfactory Essays