CompTIA Security+ (SY0-601) : Securing Networks
This section covers common sources of interference and security concerns in network communications, including radio frequency interference (RFI), crosstalk between copper wires, and data emanations. It also introduces protective measures like Protected Distribution Systems (PDS) to secure cabling and discusses SSID management to control wireless network visibility.
RFI
Radio Frequency Interference:
A disturbance that can affect electrical circuits, devices, and cables due to AM/FM transmissions or cell towers
RFI causes more problems for wireless networks
Key Terms
RFI
Radio Frequency Interference:
A disturbance that can affect electrical circuits, devices, and cables due to AM/FM tra...
Crosstalk
Occurs when a signal transmitted on one copper wire creates an undesired effect on another wire
Data Emanation
The electromagnetic field generated by a network cable or device when transmitting
A Fa...
PDS
Protected Distribution System:
Secured system of cable management to ensure that the wired network remains free from ...
SSID
Service Set Identifier:
Uniquely identifies the network and is the name of the WAP used by the clients
Disable the...
Rogue Access Point
An unauthorized WAP or Wireless Router that allows access to the secure network
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
RFI | Radio Frequency Interference: RFI causes more problems for wireless networks |
Crosstalk | Occurs when a signal transmitted on one copper wire creates an undesired effect on another wire UTP is commonly used more often than STP |
Data Emanation | The electromagnetic field generated by a network cable or device when transmitting A Faraday cage can be installed to prevent a room from emanating Split the wires of a twisted-pair connection |
PDS | Protected Distribution System: |
SSID | Service Set Identifier: |
Rogue Access Point | An unauthorized WAP or Wireless Router that allows access to the secure network |
Evil Twin | A rogue, counterfeit, and unauthorized WAP with the same SSID as your valid one |
Pre-Shared Key | Same encryption key is used by the access point and the client |
WEP | Wired Equivalent Privacy: WEP’s weakness is its 24-bit IV (Initialization Vector) |
WPA | Wifi Protected Access: WPA was flawed, so it was replaced by WPA2 |
WPA2 | 802.11i standard to provide better wireless security featuring AES with a 128-bit key, CCMP, and integrity checking WPA2 is considered the best wireless encryption available |
WPS | Wifi Protected Setup: Always disable WPS |
Wifi Jamming | Intentional radio frequency interference targeting your wireless network to cause a denial of service condition Wireless site survey software and spectrum analyzers can help identify jamming and interference |
AP Isolation | Creates network segment for each client when it connects to prevent them from communicating with other clients on the network |
War Driving | Act of searching for wireless networks by driving around until you find them Attackers can use wireless survey or open source attack tools |
War Chalking | Act of physically drawing symbols in public places to denote the open, closed, and protected networks in range |
IV Attack | Occurs when an attacker observes the operation of a cipher being used with several different keys and finds a mathematical relationship between those keys to determine the clear text data This happened with WEP and makes it easy to crack |
Wifi Disassociation Attack | Attack that targets an individual client connected to a network, forces it offline by deauthenticating it, and then captures the handshake when it reconnects Used as part of an attack on WPA/WPA2 |
Brute Force Attack | Occurs when an attacker continually guesses a password until the correct one is found Brute force will always find the password…eventually! |
WPA3 | Wi-Fi Protected Access 3 (WPA3) was introduced in 2018 to strengthen WPA2 Largest improvement in WPA3 is the removal of the Pre-Shared Key (PSK) exchange WPA3 Personal: WPA3 Enterprise: |
WPA3: SAE | Simultaneous Authentication of Equals: Simultaneous Authentication of Equals (SAE) provides forward secrecy |
WPA3: Perfect Forward Secrecy (AKA: Forward Secrecy) | A feature of key agreement protocols (like SAE) that provides assurance that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised The AP and the client use a public key system to generate a pair of long-term keys The AP and the client exchange a one-time use session key using a secure algorithm like Diffie-Hellman The AP sends the client messages and encrypts them using the session key created in Step 2 Client decrypts the messages received using the same one-time use session key The process repeats for every message being sent, starting at Step 2 to ensure forward secrecy |
Penetration Testing: Rules of Engagement | Important document: Type of testing & schedule: Rules: |
VPN: SSL VPN | Uses SSL/TLS No big VPN clients No digital cert requirement or shared passwords Unlike IPsec Very small client or within browser |
VPN: HTML5 VPN | Web cryptography API as part of browser (no software) |
VPN: Site-to-Site VPN | Almost always on L2TP |
BPDU Guard | Defends the Layer 2 Spanning Tree Protocol (STP) topology against BPDU-related threats and is designed to protect the switching network If a BPDU frame is seen on a PortFast configured interface, shutdown the device |
FIM | File Integrity Monitoring: Windows: SFC |
Passive Monitoring | Examines copy of traffic (port mirror or tap) If identified as malicious, IPS sends TCP RST (reset) frame |
Inline Monitoring | IDS/IPS sits physically inline (all traffic passes through) In-Band Response |
NAT Gateway/VPC Gateway Endpoint | Instances in a private subnet can connect to services outside your VPC, but external services cannot initiate a connection with those instances |
WPA3: GCMP Block Cipher Mode | Galois/Counter Mode Protocol |
Privilege Escalation | Occurs when a user is able to gain the rights of another user or administrator Vertical Privilege Escalation = User to Admin |