IEEE 802.11 Network Security
. . . .
5.1. IEEE 802.11 Network Security Architecture
5.1.1. Identify and describe the strengths, weaknesses, appropriate uses, and implementation of the following IEEE 802.11 security-related items:
5.2. IEEE 802.11 Network Security Analysis, Performance Analysis, and Troubleshooting
5.2.1. Describe, explain, and illustrate the appropriate applications for the following wireless security solutions from a monitoring, containment and reporting perspective:
5.1.1. Identify and describe the strengths, weaknesses, appropriate uses, and implementation of the following IEEE 802.11 security-related items:
- Weak Security Mechanisms
- WEP cipher suite
- Open System Authentication
- Shared Key Authentication
- MAC filtering
- SSID hiding
- Effective Security Mechanisms
- WPA- / WPA2-Enterprise
- WPA- / WPA2-Personal
- TKIP and CCMP cipher suites
- 802.1X / EAP framework
- Preshared Key (PSK) / passphrase authentication
- Per-user Preshared Keys (PPSK)
- Wi-Fi Protected Setup (WPS)
- Additional Mechanisms
- Secure device management protocols (HTTPS, SNMPv3, SSH2)
- Role Based Access Control (RBAC)
- Captive portals and guest networks (BYOD)
- Protected management frames
- Fast Secure Roaming methods
5.2. IEEE 802.11 Network Security Analysis, Performance Analysis, and Troubleshooting
5.2.1. Describe, explain, and illustrate the appropriate applications for the following wireless security solutions from a monitoring, containment and reporting perspective:
- Wireless Intrusion Protection System (WIPS)
- Protocol and spectrum analyzers