CSC
CRIPTOGRAFIE ȘI SECURITATE CIBERNETICĂ
Laborator
8. Comunicații wireless securizate
Comunicații wireless securizate
- Acces neautorizat - modalități
- Măsuri de securizare
- Modes of unauthorized access
- A.1 Accidental association
- A.2 Malicious association
- A.3 Ad hoc networks
- A.4 Non-traditional networks
- A.5 Identity theft (MAC spoofing)
- A.6 Man-in-the-middle attacks
- A.7 Denial of service
- A.8 Network injection
- A.9 Caffe Latte attack
- Security measures
- B.1 SSID hiding
- B.2 MAC ID filtering
- B.3 Static IP addressing
- B.4 802.11 security B.5 Restricted access networks
- B.6 End-to-end encryption
- B.7 802.11i security
- B.8 WAPI
- B.9 Smart cards, USB tokens, and software tokens
- B.10 RF shielding
- B.11 Denial of service defense
- Configurare echipamente
-
Access point
Router Wireless
Metode de evaluare a securității
Referinte
https://en.wikipedia.org/wiki/Wireless_security... Realizati configurarea echipamentelor wireless si in alte moduri decât cele standard