Question
Whats the difference between WEP and WPA mobile security solution. I have created a table for you to complete to help you understand the differences.
Whats the difference between WEP and WPA mobile security solution. I have created a table for you to complete to help you understand the differences. Which one will prevent a man in the middle attack and why.
| WEP | WPA |
Key length |
|
|
key creation |
|
|
Encryption |
|
|
Initialization Vector who has it and what does it do |
|
|
Security flaws |
|
|
Pin flaws |
|
|
Temporal Key Integrity Protocol who has it and what does it do |
|
|
Message Integrity Check who has it and what does it do |
|
|
Which one is preferred |
|
|
Give an example when an Open Method for Preshared keys is used.
Give an example when Preshared key (PSK) is used
Why is WPA2 more secure than WPA
| WPA | WPA2 |
Encryption Method (same or different) |
|
|
Key length |
|
|
Name of 48-bit value |
|
|
MIC value length and what does it protect |
|
|
|
|
|
Compare and Contrast Access Point (AP) Types
| Fat Client | Thin Client |
Benefit |
|
|
Disadvantage |
|
|
| Standalone | Controller |
Benefit |
|
|
Disadvantage |
|
|
|
|
|
Give an example of when you have been encountered a Captive Portal AP. What does Captive Portal AP mean?
What is Bluetooth wireless technology?
What is the difference between Basic Rate/Enhanced Rate Data Rate and Bluetooth Low Energy
| What it is | How to Prevent |
Bluejacking |
|
|
BlueSnarking |
|
|
8.NFC (Near Field Communication) is a wireless communication between 2 devices. Give an example for each of the risks and what you can do to prevent it.
Example | Risk | Defense |
| Man in the Middle |
|
| Eavesdropping |
|
| Data Theft |
|
9.WLAN Enterprise Attacks
Attack type | Definition | Defense |
Evil Twin |
|
|
Intercepting Data |
|
|
Wireless Replay Attack (hijacking) |
|
|
Rogue AP |
|
|
Man in the middle |
|
|
Jamming |
|
|
Disassociation Attack |
|
|
10.Methods to protect WLAN
Method | Explanation | Vunerabilites |
MAC Address Filtering |
|
|
SSID Broadcasting |
|
|
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started