Describes the amount of information that may be broadcast over a connection
Bandwidth
Wireless network (Wi-Fi) refers to WLANs based on what standard?
IEEE 802.11 standard
An encryption algorithm has significant vulnerabilities and can be easily cracked.
WEP
This is a short-range wireless communication technology that replaces the cables connecting portable or fixed devices while maintaining high levels of security.
Bluetooth
What is a Signaling System 7 (SS7) protocol and what is it vulnerable to?
a communication protocol that allows mobile users to exchange communication through another cellular network. it is vulnerable to man-in-the-middle attacks.
Used to connect wireless devices to a wireless/wired network
Access point (AP)
An advanced wireless encryption protocol that uses TKIP and MIC
WPA
An upgrade to WPA using AES and CCMP
WPA2
What are the three Bluetooth modes?
Discoverable, Limited discoverable, and non-discoverable
What are three challenges in regards to security involving IoT?
1. Lack of security/privacy 5. Clear text protocols/open ports
2. Vulnerable to web interfaces 6. coding errors (buffer overflow)
3. Legal, regulatory, rights issues 7. storage issues
4. Default, weak, hardcoded credentials 8. difficult to update firmware/OS
A universal system used for mobile transportation for wireless networks worldwide.
GSM
An encryption protocol used in WPA2 for stronger encryption and authentication
CCMP
WPA2-Personal uses a set-up password to protect unauthorized network access while WPA2-Enterprise includes EAP or RADIUS for centralized client authentication using multiple authentication methods
This is a DoS attack, which overflows Bluetooth-enabled devices with random packets causing it to crash
Bluesmacking
What is OT and what was it designed for?
OT is Operational Technology and it was designed to detect or cause changes in industrial operations through direct monitoring and/or controlling of industrial physical devices.
The MAC address of an AP that has set up a Basic Service Set (BSS)
BSSID
AES
The wireless encryption method is an advanced implementation of WPA2 that provides protection from offline dictionary attacks and uses the AES-GCMP 256 encryption algorithm
WPA3
This is the theft of information from a wireless device through a Bluetooth connection
Bluesnarfing
This occurs when a perpetrator injects any faulty or malicious program into the system to compromise the system security
Fault injection attacks
A set of frequencies for the international industrial, scientific, and medical communities.
ISM band
A centralized authentication and authorization management system.
RADIUS
Temporal Key Integrity Protocol (TKIP) utilizes what type of cipher?
RC4 stream cipher with 128-bit keys
This attack is carried out by persuading the victim to install a malicious app designed by the attacker. This malicious app replaces legitimate apps, allowing the attacker to generate a large volume of ads on the victim's device through the infected apps.
Agent Smith Attack
OT consists of this to monitor and control the industrial operations
Industrial Control Systems (ICS)