All contents copyright (c) 2011 ZyXEL Communications Corporation.
80
What are Insertion Attacks?
The insertion attacks are based on placing unauthorized devices on the wireless
network without going through a security process and review.
What is Wireless Sniffer?
An attacker can sniff and capture legitimate traffic. Many of the sniffer tools for
Ethernet are based on capturing the first part of the connection session, where the
data would typically include the username and password. An intruder can
masquerade as that user by using this captured information. An intruder who
monitors the wireless network can apply this same attack principle on the wireless.
What is the difference between Open System and
Shared Key of Authentication Type?
Open System:
The default authentication service that simply announces the desire to associate with
another station or access point. A station can authenticate with any other station or
access point using open system authentication if the receiving station designates
open system authentication.
Share Key:
The optional authentication that involves a more rigorous exchange of frames,
ensuring that the requesting station is authentic. For a station to use shared key
authentication, it must implement WEP.
What is 802.1x?
IEEE 802.1x Port-Based Network Access Control is an IEEE (Institute of Electrical and