O'Reilly logo

Microsoft® Windows® Security: Essentials by Darril Gibson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Comparing Wireless Security Methods

The Wi-Fi Protected Access (WPA and WPA2) protocols provide the primary security for wireless networks today. However, there are different flavors of WPA and WPA2 that you should understand. Also know that an older protocol called Wired Equivalent Privacy (WEP) has significant weaknesses and shouldn’t be used at all. But because WEP is still used by so many unsuspecting users, it’s important to understand its weaknesses and flaws.

Understanding Encryption Keys

Different wireless security methods use keys, so it’s important to understand some basics about encryption keys. Wireless security uses symmetric encryption, which means that a single key is used to encrypt and decrypt data.

Chapter 10 covers the use ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required