3 Wireless Technologies (mcq)
i. Infrared communication
* Line-of-sight
ii. Terrestrial microwave
* Line-of-sight
iii. Radio waves
* High-frequency and low-frequency radio technology
Types of Wireless Networks
ref img
4 Wireless Network Vulnerabilities
3 Types of Wireless Network Attacks
WPAN - Bluetooth | What is Bluetooth
WPAN - Bluetooth | What is it perfect for
WPAN - Bluetooth | What is it useful for
4 Bluetooth Attacks
WLAN – 802.11 | What is it
TESTED - REF IMAGE
5 WLAN Attacks (First 3)
5 WLAN Attacks (Last 2)
Wired Equivalent Privacy (WEP)
WEP Encryption (btr go watch video)
3 WEP Weakness (btr go watch video)
How does WEP Weakness happen
What is used to Crack WEP Secret Key
AirSnort/Aircrack-ng
How does Cracking WEP Secret Key operate
WLAN Security Solutions - WPA (Wi-Fi Protected Access)
WLAN Security Solutions - WPA2 (Wi-Fi Protected Access 2)
no
What is WWAN - WiMAX
WWAN - WiMAX
* WiMAX tower
- Similar in concept to a cell-phone tower
- Provides coverage to very large area - 8,000 km2
no
Properties of WWAN - WiMAX
no
4 WiMAX Security Issues