Wireless Networks

Cards (16)

  • Wireless passwords: pre-shared key is used to authenticate to the wireless network.
  • Kerberos: Used on Windows to authenticate users in Active directory. (username and password)
  • Kerberos: The Protocol that allows users to use a username and password to log into any machine.
  • Multifactor: Combine multiple methods to increase security of login.
  • Sender Policy Framework : Authentication method that prevents email spoofing.
  • DKIM : Allows email servers to block spoofed sender addresses.
  • DMARC : provides analysis and reporting about who is sending emails from a given domain.
  • RADIUS: Centralize authentication for users
  • TACACS: Centralised authentication protocols used in businesses to authenticate users.
  • Kerberos: Assign a unique encrypted key, ticket, to each user connected to the network.
  • Unified threat management : A single hardware provides multiple security functions.
  • War driving: Searching for unsecured wireless networks.
  • UPnP: A networking protocol that allows devices to learn about the presence and communicate with each other.
  • Power level controls: adjusting the boundary range of a wireless signal
  • S/MIME: Encryption protocol that encrypts the contents of the mail.
  • Network Access Control: Rules a user attempting to connect to the network must comply with. (e.g., host must be free of virus and have patches applied).