Page 261 - StudyBook.pdf
P. 261
Communication Security: Wireless • Chapter 4 245
Exam Objectives
Frequently Asked Questions
The following Frequently Asked Questions, answered by the authors of this
book, are designed to both measure your understanding of the Exam
Objectives presented in this chapter, and to assist you with real-life imple-
mentation of these concepts.
Q: Is 128-bit WEP more secure than 64-bit WEP?
A: Not really.This is because the WEP vulnerability has more to do with the 24-
bit initialization vector than the actual size of the WEP key.
Q: If I am a home user, can I assume that if I use MAC filtering and WEP, my
network is secure?
A: You can make the assumption that your home network is more secure than it
would be if it did not utilize these safeguards. However, as shown in this
chapter, these methods can be circumvented to allow for intrusion.
Q: Where can I find more information on WEP vulnerabilities?
A: Besides being one of the sources who brought WEP vulnerabilities to light,
www.isaac.cs.berkeley.edu has links to other Web sites that cover WEP insecuri-
ties.
Q: If I have enabled WEP, am I now protected?
A: No. Certain tools can break all WEP keys by simply monitoring the network
traffic (generally requiring less than 24 hours to do so).
Q: Is there any solution available besides RADIUS to perform external user and
key management?
A: No. Plans are available from manufacturers to identify other ways of performing
user/key management, but to date nothing is available.
Q: How can I protect my wireless network from eavesdropping by unauthorized
individuals?
www.syngress.com