Comparing Wireless Security Methods

The Wi-Fi Protected Access (WPA and WPA2) protocols provide the primary security for wireless networks today. However, there are different flavors of WPA and WPA2 that you should understand. Also know that an older protocol called Wired Equivalent Privacy (WEP) has significant weaknesses and shouldn’t be used at all. But because WEP is still used by so many unsuspecting users, it’s important to understand its weaknesses and flaws.

Understanding Encryption Keys

Different wireless security methods use keys, so it’s important to understand some basics about encryption keys. Wireless security uses symmetric encryption, which means that a single key is used to encrypt and decrypt data.

Chapter 10 covers the use ...

Get Microsoft® Windows® Security: Essentials now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.