IST 462 Network Security Test 3 JOHN HAMNER_______________________ After answering the following questions, change the name of your file to LastName.FirstName.Test3 Part1 and copy your file to the correct folder on Blackhawk. Do all your work on your desktop. Do not use a flash drive or any Internet resources. 1. What was the name of the original IEEE standard for wireless transmissions? 802.11 2. How do most wireless access points contol access from a remote device? Through wireless encryption protocol (WEP) keys 3. What is the purpose of WEP? To protect data that is transmitted wireless from being picked up by those outside the network and potentially exploited 4. Describe the process WEP uses to encrypt data. WEP converts the data with a cipher into some sort of encrypted mumbo jumbo 5. What is the SSID and how is it used for authentication? The SSID is the wireless network name and devices use it to access particular wireless networks. 6. Why is MAC address filtering considered weak? Because it is so easy to advertise a false MAC address and gain access to a network 7. Why is WEP considered to be weak? WEP keys are fairly short and it is possible to obtain and decrypt the key without having authorized access to the wireless network 8. PSK serves two purposes. What are they? To secure and encrypt data transmitted wireless and resist decryption by outside attackers 9. Explain the difference between the three terms: identification, authentication, and authorization. Identification: username Authentication: password Authorization: user privileges 10. Of the access control models discussed in class, which one is closest to “group permissions?” Role-based 11. Describe an access control list for a Unix machine. An access control list for a unix machine is the user names and their groups. Single users can be assigned permissions as can groups of users. Permissions include read, write, and execute and can be applied to files and directories 12. What does the “enforce password history” policy do? It prevents users from reusing old passwords when prompted to create a new one 13. What does the “maximum password age” policy do? Maximum password age sets the amount of time that must pass before a user is allowed to recycle an old password 14. If “enforce password history” is set to 12 and “maximum password age” is set to 10, then how many days must elapse before a user can reuse a previous password? 120 days 15. Describe how a time-synchronized one-time password with a token works. The token provides the password to the user based off some sort of algorithm shared with the authentication server. The password the token creates is viable only for a short period of time before it expires. 16. How can the above password system be compromised? The token can be stolen and used by an attacker or an attacker could attempt to intercept the password in the brief window that it is available. 17. Explain how keystroke dynamics might be used to authenticate a user. Keystroke dynamics attempts to identify a user based on the rhythm and cadence of their typing 18. Give an example of cognitive biometrics that can be used to authenticate a user. Cognitive biometrics attempts to identify a user based on what s/he usually does. 19. What is an advantage of VPN? A VPN is virtual and private! With a VPN it becomes possible to create virtual LANs over other types of networks. E.g. Hamachi is a software program that allows users to create VPNs over the internet. It assigns virtual IP addresses for these machines and they can communicate as if they are networked 20. What is an disadvantage of VPN? There are potential privacy concerns. Hamachi, for example, handles all the VPN traffic through their own servers, potentially raising privacy concerns for user date