Skip to Main Content
Microsoft® Windows® Security: Essentials
book

Microsoft® Windows® Security: Essentials

by Darril Gibson
June 2011
Beginner content levelBeginner
372 pages
9h 54m
English
Sybex
Content preview from Microsoft® Windows® Security: Essentials

Comparing Wireless Security Methods

The Wi-Fi Protected Access (WPA and WPA2) protocols provide the primary security for wireless networks today. However, there are different flavors of WPA and WPA2 that you should understand. Also know that an older protocol called Wired Equivalent Privacy (WEP) has significant weaknesses and shouldn’t be used at all. But because WEP is still used by so many unsuspecting users, it’s important to understand its weaknesses and flaws.

Understanding Encryption Keys

Different wireless security methods use keys, so it’s important to understand some basics about encryption keys. Wireless security uses symmetric encryption, which means that a single key is used to encrypt and decrypt data.

Chapter 10 covers the use ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The .NET Developer's Guide to Windows Security

The .NET Developer's Guide to Windows Security

Keith Brown
Windows File System Troubleshooting

Windows File System Troubleshooting

MVP Mike Halsey, MVP Andrew Bettany

Publisher Resources

ISBN: 9781118114575Purchase book