Home‎ > ‎CIS 194‎ > ‎

Lesson 12: Windows Mobile

Presentation slides are here.

Objectives
  • Configure wireless network adapters.
  • Use the Windows Mobility Center.
  • Use BitLocker.
  • Use DirectAccess.

Vocabulary
Advanced Configuration and Power Interface (ACPI) A power management standard, developed by Microsoft, Intel, and Toshiba, which enables a computer’s operating system to regulate the power consumption of specific system components, based on input received from an application, a device driver, or a user.

Advanced Encryption Standard (AES) A cryptographic algorithm used in the Wi-Fi Protected Access 2 (WPA2) wireless networking security protocol.

BitLocker Drive Encryption A feature included with the Windows 7 Enterprise and Ultimate editions that Microsoft designed to address the problem of compromised data that when a computer is lost or stolen. 

data recovery agent (DRA) A user account that an administrator has authorized to recover BitLocker drives for an entire organization with a digital certificate on a smart card. 

DirectAccess A new remote access solution in Windows 7 and Windows Server 2008 R2 that enables clients to remain connected to their host networks whenever they have access to the Internet, reconnecting automatically whenever it is necessary.

IEEE 802.11 A series of standards published by the Institute of Electrical and Electronics Engineers that define wireless networking protocols using various technologies and running at various speeds. 

IKEv2 Mobility and Multihoming (MOBIKE) A protocol on which the Windows 7 VPN Reconnect feature is based. 

Institute of Electrical and Electronic Engineers (IEEE) A body of engineering and electronics professionals that is best known for publishing standards defining a wide variety of networking and other technologies.

Internet Key Exchange, Version 2 (IKEv2) A virtual private networking protocol that is new in Windows 7 and Windows Server 2008 R2, uses TCP port 500, and provides support for IPv6 and the new VPN Reconnect feature, as well as authentication by EAP, using PEAP, EAP-MSCHAPv2, or smart cards. 

IPsec A collection of IP extensions that provide additional security for network communications. 

Layer 2 Tunneling Protocol (L2TP) A virtual private networking protocol that relies on the IP security extensions (IPsec) for encryption, and as a result performs a double encapsulation. 

multiple-input multiple-output (MIMO)  A wireless networking technology that increases wireless networking speeds by using multiple transmitter and receiver antennae on each device.

Offline Files A form of fault tolerance in which Windows 7 workstations copy server-based folders that users designate for offline use to the local drive, and the users work with the copies, which remain accessible whether the computer is connected to the network or not. 

Point-to-Point Protocol (PPP) A communications protocol used in dial-up connections that takes the place of the Ethernet protocol at the data-link layer, by encapsulating the datagrams created by the Internet Protocol (IP) at the network layer, to prepare them for their transmission. 

Point-to-Point Tunneling Protocol (PPTP)  A virtual private networking protocol that takes advantage of the authentication, compression, and encryption mechanisms of PPP, tunneling the PPP frame within a
Generic Routing Encapsulation (GRE) header and encrypting it with Microsoft Point-to-Point Encryption (MPPE), using encryption keys generated during the authentication process.

Secure Password (EAP-MSCHAPv2) One of three types of EAP-based authentication supported by Windows 7, the default selection for new connections, and the strongest password-based mechanism in Windows 7.

Secure Socket Tunneling Protocol (SSTP) A virtual private networking protocol that encapsulates PPP traffic using the Secure Sockets Layer (SSL) protocol supported by virtually all web servers. 

spatial multiplexing A transmission system in which the sending system splits its data into two signals for transmission, and the receiving device reassembles the signals into a single data stream.

Temporal Key Integrity Protocol (TKIP)  An encryption option for Wifi Protected Access Protocol, TKIP encrypts data using the RC4 algorithm with a 128-bit key.
transparent caching A Windows 7 feature that saves copies of files users access from remote servers on a local drive, whether or not the files are configured as offline files. The cached files do not remain available when the computer is disconnected from the network, but they do provide the users with faster repeat access.

Trusted Platform Module (TPM) A dedicated cryptographic processor chip that the system uses to store the BitLocker encryption keys.

tunneling A communications technique in which data packets are encapsulated inside another packet.

virtual private network (VPN) A client/server connection in which the remote client and the remote access server are both connected to the Internet, using local service providers.

VPN Reconnect A new Windows 7 feature that enables a computer to reconnect to a VPN server automatically, after an interruption as long as eight hours.

WiFi Protected Access (WPA) One of two main security protocols used in the wireless LAN devices on the market today. WPA is comparatively recent and secure, but some older devices do not support it.

Wired Equivalent Privacy (WEP) One of two main security protocols used in the wireless LAN devices on the market today. WEP has been around for some time and is relatively insecure, but it is supported by virtually all wireless LAN products.
Comments