In: Computer Science
1. Describe wireless networking standards
2. Describe the process of authentication
3. Describe wireless hacking and tools used by hackers and security professionals
4. Explain that configuring an AP varies depending on the embedded OS.
5. Explain how data sent by one station moves between these three components to reach a second station.
6. Explain the security improvements of 802.11i over 802.11b.
Book to use: Michael T. Simpson, Nicholas Antill, Hands-On Ethical Hacking and Network Defense, Third Edition. (Chapter 11)
PLEASE ANSWER ALL QUESTIONS!!! or leave for someone who would
Answer 1:-
Wireless standards are a set of services and protocols that dicate how your Wi-Fi network (and other data transmission networks) acts. Wi-Fi standards specifies an over-the-air interface between a wireless client and a base station or between two wireless clients. The most common set of wireless standards yoy will encounter is the IEEE 802.11 Wireless LAN (WLAN) & Mash. The IEEE update the 802.11 Wi-Fi standards every few years, The current Wi-Fi standards is 802.11ac, while the next generation Wi-Fi standards, 802.11ax, is in the process of rolling out.
Answer 2:-
Authentication is the process of recognization a user's identity. It is the mechanism of associating an icoming request with a set of identifying credentials. The credentials provided are compared to those file in a databae of the authorized user's information on a local operating system or within an authentication server.
The authentication process always runs at the start of the application, before the permission and throtting checkd occur, and before any other code is allowed to proceed. Different systems may require different types of credentials to ascertain a user's identity. The credential often takes the form of password, which is a secret and known only to the individual and the system. Three categories in which someone the use knows, something the user is, and something the user has.
Answer 3:-
Wireless hacking is essentially cracking the security protocols in a wireless network, granting full access for the hacker to view, store, download, or abuse the wireless netwrok. Usually, when someone hacks into a Wi-Fi, they are able to observe all the data that is being sent via the network.
Tools used by hackers are:-