Documente Academic
Documente Profesional
Documente Cultură
• WLAN threats
• 1- Unstructured threats :
• - It happened by hackers who aren’t technical , they use simple tools to
steal the passwords.
2- Unstructured threats:
- It happened by hackers who are more technical
- - They can know the network vulnerabilities then they can provide a
script or a code or a program to use it in accessing to the network.
- 3- External threats:
- - It may be happened by a person or organized group from the
outside of the network , they aren’t authorized to access to the
network.
• 4- Internal threats :
• - It happened by a person who is has the permission and authorized
to access to the network from the internal employees , he can
damage the network.
Spy
-To gather information isn’t allowed to be known
-Access
- Unauthorized person access to the network ( doesn’t have any
account ), he can access by guessing the password or he know that the
password is weak.
• The following steps occur when two devices use Open System Authentication:
The station sends an authentication request to the access point.
The access point authenticates the station.
The station associates with the access point and joins the network.
• The process is illustrated below.
-2- Enterprise :
- For large installation ( username , password).
-1- WPA2
- Version of the final 802.11i standard .
- Support EAP (Extensible Authentication Protocol) authentication
method .
-2- 802.1x
- IEEE standard for access of wireless and wired LANs , Provide
authentication and authorization of LAN nodes .
- Define (EAP) protocol which use central authentication server.