Maximum Wireless Security

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

radiation zone

       access point-based security   2nd   3rd   4th   5th  

       signal bleeding   2nd   3rd   4th   5th  

radio frequency (RF) energy   2nd  

radio spectrum

       FCC defined frequencies   2nd   3rd   4th   5th  

RADIUS

       (Remote Authentication Dial-In User Service)  

       Funk Steel-Belted Server software   2nd   3rd  

               accounting methods  

               authentication methods   2nd   3rd  

               hardware admninistration features   2nd  

               rogue access point regulation  

               system requirements   2nd  

               typical server configuration  

               user admninistration features   2nd  

       servers

               WLAN security  

RAM

       buffer overflow attacks   2nd   3rd  

RC4 algorithm

       TKIP (Temporal Key Integrity Protocol)  

       WEP security  

               checksums  

               decryption process  

               Key Scheduling Algorithm   2nd   3rd   4th   5th   6th  

               Key Scheduling Algorithm functions   2nd  

               packet keys   2nd  

               PRG Algorithm   2nd   3rd   4th  

RC4 encryption

       algorithm  

               leakage of  

       algorithms

               Key Scheduling Algorithm (KSA)   2nd   3rd   4th   5th   6th   7th  

               Pseudo Random Generation Algorithm (PRGA)   2nd   3rd   4th   5th   6th   7th  

       ciphers  

               block   2nd  

               self-synchronizing stream   2nd  

               stream   2nd  

       Initialization Vector (IV)   2nd  

       RSA Data Security development  

       SSL protocol  

       states   2nd  

               array creation   2nd  

       WEP

               64-bit/128-bit   2nd   3rd  

               implementation   2nd  

               key strength   2nd   3rd  

               live wireless data transmission example   2nd   3rd  

       WEP protocol  

               Initialization Vector (IV) weaknesses  

               Intialization Vector (IV) weaknesses  

       XOR function

               PRGA with plaintext example   2nd  

               sample comparison   2nd   3rd   4th  

recovering

       lost passwords

               legality of  

reference resources   2nd  

Remote-Access Model (VPNs)  

resources

        publications   2nd  

       Web sites   2nd  

Rijndael algorithm

       AES (Advanced Encryption Standard)   2nd  

ROC curves

       (receiver operating characteristics)  

       IDS accuracy measure  

rogue access points

       Funk Steel-Belted Server software (RADIUS)  

       VPNs  

rogue Access Points (APs)   2nd   3rd   4th  

RSA algorithm (PKI)  

RSA Data Security

       RC4 encryption development  

Категории