Page 261 - StudyBook.pdf
P. 261

Communication Security: Wireless • Chapter 4  245

                 Exam Objectives

                 Frequently Asked Questions



                 The following Frequently Asked Questions, answered by the authors of this
                 book, are designed to both measure your understanding of the Exam
                 Objectives presented in this chapter, and to assist you with real-life imple-
                 mentation of these concepts.


                 Q: Is 128-bit WEP more secure than 64-bit WEP?
                 A: Not really.This is because the WEP vulnerability has more to do with the 24-
                    bit initialization vector than the actual size of the WEP key.

                 Q: If I am a home user, can I assume that if I use MAC filtering and WEP, my
                    network is secure?
                 A: You can make the assumption that your home network is more secure than it
                    would be if it did not utilize these safeguards. However, as shown in this
                    chapter, these methods can be circumvented to allow for intrusion.


                 Q: Where can I find more information on WEP vulnerabilities?
                 A: Besides being one of the sources who brought WEP vulnerabilities to light,
                    www.isaac.cs.berkeley.edu has links to other Web sites that cover WEP insecuri-
                    ties.

                 Q: If I have enabled WEP, am I now protected?

                 A: No. Certain tools can break all WEP keys by simply monitoring the network
                    traffic (generally requiring less than 24 hours to do so).


                 Q: Is there any solution available besides RADIUS to perform external user and
                    key management?
                 A: No. Plans are available from manufacturers to identify other ways of performing
                    user/key management, but to date nothing is available.

                 Q: How can I protect my wireless network from eavesdropping by unauthorized
                    individuals?





                                                                              www.syngress.com
   256   257   258   259   260   261   262   263   264   265   266