Comparing Wireless Security Methods
The Wi-Fi Protected Access (WPA and WPA2) protocols provide the primary security for wireless networks today. However, there are different flavors of WPA and WPA2 that you should understand. Also know that an older protocol called Wired Equivalent Privacy (WEP) has significant weaknesses and shouldn’t be used at all. But because WEP is still used by so many unsuspecting users, it’s important to understand its weaknesses and flaws.
Understanding Encryption Keys
Different wireless security methods use keys, so it’s important to understand some basics about encryption keys. Wireless security uses symmetric encryption, which means that a single key is used to encrypt and decrypt data.
Chapter 10 covers the use ...
Get Microsoft® Windows® Security: Essentials now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.