Chapter 7
Module 7 Summary
Chapter 7 has an overview of wireless networks, going over how they work and all the things we use in our daily lives that we never think twice about, like Bluetooth. It also goes over security concerns and how to secure wireless networks. Something new that I learned about was how to create a personal area network (PAN) using Bluetooth, and how it’s referred to a piconet.
Something I’ve always been aware of is the internet of things, it does carry a large security concern due to vulnerabilities, but it is convenient in many ways. It’s basically embedded technology that can connect to a network for functionality. Either it’s for personal health devices, like monitoring steps and heart rate. Making life more convenient with wireless lighting and thermostats. And sometimes it’s used for security through wireless doorbell alarm system.
One thing I found interesting is how security keys work, I had an idea it used a large string of characters but I never knew how detailed it was truly. It uses a passphrase that’s entered by the user in combination with a key, either 64-bit or 128-bit. The higher means the longer, which means it’ll take longer for any attacker to crack, though it isn’t easy to crack a key since it requires a lot of computing power which most attackers don’t have, or aren’t willing to use on a regular target.
