6.2 Use and apply appropriate cryptographic tools and products
Once you understand the basics of cryptography, the next step is applying and using cryptography in real-world environments. This section discusses how to use and apply appropriate cryptographic tools and products.
WEP vs. WPA/WPA2 and preshared key
In the wireless world, there are really only three encryption methods that are commonly known. WEP, or the Wired Equivalent Privacy protocol, was the original wireless encryption standard until the early 2000s when WEP was deprecated and replaced by WPA, or WiFi Protected Access. WPA2 is currently the best WiFi encryption standard publicly available. WPA2 offers both a Personal and Enterprise option and employs the AES protocol for confidentiality. ...
Get CompTIA Security+™: Review Guide, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.