2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet449/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   445   446   447   448   449   450   451   452   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

481
WPS 
Wi-Fi Protected Setup (WPS)
is a security standard for wireless networks. It is intended 
to simplify the effort involved in adding new clients to a well-secured wireless network. 
It operates by autoconnecting the fi rst new wireless client to seek the network once the 
administrator triggered the feature by pressing the WPS button on the base station. 
However, the standard also calls for a code or personal identifi cation number (PIN) that 
can be sent to the base station remotely in order to trigger WPS negotiation without the 
need to physically press the button. This led to a brute-force guessing attack that could 
enable a hacker to guess the WPS code in hours (usually less than six hours), which in turn 
enabled the hacker to connect their own unauthorized system to the wireless network. 
The PIN code is composed of two four-digit segments, which can be 
guessed one segment at a time with confirmation from the base station.
WPS is a feature that is enabled by default on most wireless access points because it is a 
requirement for device Wi-Fi Alliance certifi cation. It’s important to disable it as part of a 
security-focused predeployment process. If a device doesn’t offer the ability to turn off WPS 
(or the Off switch doesn’t work), upgrade or replace the base station’s fi rmware or replace 
the whole device. 
Generally, leave WPS turned off. Each time you upgrade your fi rmware, perform your 
security-focused predeployment process again to ensure that all settings, including WPS, 
are set properly. If you need to add numerous clients to a network, you can temporarily 
reenable WPS—just be sure to disable it immediately afterward.
Using Captive Portals 
A
captive portal
is an authentication technique that redirects a newly connected wireless 
web client to a portal access control page. The portal page may require the user to input 
payment information, provide logon credentials, or input an access code. A captive portal 
is also used to display an acceptable use policy, privacy policy, and tracking policy to the 
user, who must consent to the policies before being able to communicate across the net-
work. Captive portals are most often located on wireless networks implemented for public 
use, such as at hotels, restaurants, bars, airports, libraries, and so on. However, they can be 
used on cabled Ethernet connections as well.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   445   446   447   448   449   450   451   452   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish