Part 1:
Question 1
Standard Definition Algorithm Suggested Use
WEP A wireless protocol that is intended to deliver the privacy comparable to that of a wired network. RC4 No longer used unless it is for lessons in hacking. Big security flaws and easy to hack.
WPA This protocol offers more data encryption than WEP and also offers user authentication. RC4 with TKIP This is used with older devices. But these may still need an update through firmware so they will be compliant.
WPA2 This protocol offers CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) as the replacement of TKIP. AES Only used in newer devices.
(Dulaney & Easttom, 2014) (How To Geek, n.d.)
Question 2 Temporal Key Integrity Protocol (TKIP) is an encryption protocol that is included in the IEEE 802.11i standard for wireless LAN networks. It helps provide more encryption security than Wired Equivalent Privacy (WEP). TKIP uses its algorithms to protect WEP’s security flaws and allows the users of older devices to upgrade without replacing any hardware. These algorithms are additional code at the beginning and end to capture and modify WEP. TKIP uses RC4 as its foundation but it also includes four more algorithms to increase strength: cryptographic message integrity check, initialization-vector sequencing mechanism, per-packet key-mixing function, and re-keying mechanism. Although, TKIP is used for upgrading security on devices equipped with WEP, it isn’t dependable or effective
With the ever increasing surge of digital communications and transactions, a tougher level of security is essential in order to safeguard the user and their data transactions. Systems, personal computers, mobile phones, servers, and even smart cards are all being used everywhere and there is a need to secure communications. With the influx of data management, there is a clear race between the two challengers in the game known as Information Security between developers and the hackers. PKI was designed to influence the Internet infrastructure for means of communication (Samuelle, 2011). While decreasing antagonistic misuse of data, reducing data theft, and providing an extra layer of trust through key pairs and
Privacy: In a wireless network all the devices are able to hear data traffic within their ranges which can be a threat to the security of the link. IEEE 802.11 counters this problem by offering a privacy service option that raises the security level of the 802.11 network to that of a wired network.
People should use this product because you don't have to carry around books that need to be read. Just a little scanner that scans a book and sends it to your your phone the scanner is also waterproof so you can use it in the shower if you like to do work in the shower the scanner even has a SD card in it so that you could put the info on a computer. This piece of technology can help anyone not just student. For instance say
It is a protocol that allows users to access a remote network through a secure channel using encrypted passwords.
To improve security, the Wi-Fi uses various built-in WEP encryption technologies to prevent attacks from
Outline a wireless network and technology that you use regularly. The WLANs which are derived from the IEEE 802.11 standards, and marketed under the Wi-Fi trademark name. The WLANs security is neither forthright/candid nor simple, and it is continuously varying. Even though, as WLAN increase client output, they also expose the networks to a new group of potential hackers. With the present inherent security weakness of the 802.11 standard, all companies, small, medium or large, need to find out their security conditions derived from the applications using the WLAN. The standards also provide requirements for high-speed networks that support most modern-day applications. What sorts of security issues do
This scenario is an example of using an access point, which a lot of people currently use to be able to access the internet via WiFi,
WAP came in shortly behind WEP with secure networking communication in mind. It’s a later discovered that WEP doesn’t protect much at all and was then replaced with WPA/WPA2. WPA/WPA2 is the most widely used today. In fact, the only time WEP should be used is when there needs to be communication with old devices that don’t support encryption. WEP, or Wired Equivalent Privacy, is not hard encryption to crack. WAP, or Wireless Application Protocol, uses a smaller revision of HTML called Wireless Markup Language (WML), and is used is wireless devices. WPA/WPA2 is now known as the most secure communication over the internet today. WTLS, Wireless Transport Layer Security, provides authentication, encryption, and data integrity for wireless devices (Dulaney,
Some of the Authentication techniques used are Extensible Authentication Protocol, EAP – Transport Layer Security, EAP-Microsoft Challenge Handshake Authentication Protocol version 2(EAP-MS-CHAP v2) and Protected EAP (PEAP).
This standard provides for user/device authentication as well as distribution and management of encryption keys.
Wi-Fi Protected Access 2, the follow on security method to WPA for wireless networks that provides stronger data protection and network access control. It provides enterprise and consumer Wi-Fi users with a high level of assurance that only authorized users can access their wireless networks. Based on the IEEE 802.11i standard, WPA2 provides government grade security by implementing the National Institute of Standards and Technology (NIST) FIPS 140-2 compliant AES encryption algorithm and 802.1x-based authentication.
17. __________ is a technology that allows computers to share a network or internet connection wirelessly without the need to connect to a commercial network.
It allows us to review with the class before our tests. It can do Kahoot and other fun class games. We use it for our tests. They can also be used for homework.
Context: Our networks are becoming more vulnerable because of wireless and mobile computing. Ubiquitous devices can and do pose a significant vulnerability. In this activity, you are to think outside the box and determine how to best defend against these threats.
The ability to send and receive data efficiently is the most important objective of networking computers.