Question: Whats the difference between WEP and WPA mobile security solution. I have created a table for you to complete to help you understand the differences.
Whats the difference between WEP and WPA mobile security solution. I have created a table for you to complete to help you understand the differences. Which one will prevent a man in the middle attack and why.
|
| WEP | WPA |
| Key length |
|
|
| key creation |
|
|
| Encryption |
|
|
| Initialization Vector who has it and what does it do |
|
|
| Security flaws |
|
|
| Pin flaws |
|
|
| Temporal Key Integrity Protocol who has it and what does it do |
|
|
| Message Integrity Check who has it and what does it do |
|
|
| Which one is preferred |
|
|
Give an example when an Open Method for Preshared keys is used.
Give an example when Preshared key (PSK) is used
Why is WPA2 more secure than WPA
|
| WPA | WPA2 |
| Encryption Method (same or different) |
|
|
| Key length |
|
|
| Name of 48-bit value |
|
|
| MIC value length and what does it protect |
|
|
|
|
|
|
Compare and Contrast Access Point (AP) Types
|
| Fat Client | Thin Client |
| Benefit |
|
|
| Disadvantage |
|
|
|
| Standalone | Controller |
| Benefit |
|
|
| Disadvantage |
|
|
|
|
|
|
Give an example of when you have been encountered a Captive Portal AP. What does Captive Portal AP mean?
What is Bluetooth wireless technology?
What is the difference between Basic Rate/Enhanced Rate Data Rate and Bluetooth Low Energy
|
| What it is | How to Prevent |
| Bluejacking |
|
|
| BlueSnarking |
|
|
8.NFC (Near Field Communication) is a wireless communication between 2 devices. Give an example for each of the risks and what you can do to prevent it.
| Example | Risk | Defense |
|
| Man in the Middle |
|
|
| Eavesdropping |
|
|
| Data Theft |
|
9.WLAN Enterprise Attacks
| Attack type | Definition | Defense |
| Evil Twin |
|
|
| Intercepting Data |
|
|
| Wireless Replay Attack (hijacking) |
|
|
| Rogue AP |
|
|
| Man in the middle |
|
|
| Jamming |
|
|
| Disassociation Attack |
|
|
10.Methods to protect WLAN
| Method | Explanation | Vunerabilites |
| MAC Address Filtering |
|
|
| SSID Broadcasting |
|
|
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
