Checkpoint week 8 2 - Checkpoint Checkpoint WLAN IT 242 1 Checkpoint WLAN security is very important is that most transmissions occur over

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Checkpoint 1 Checkpoint: WLAN IT 242
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Checkpoint 2 WLAN security is very important is that most transmissions occur over transparent mediums. This makes it especially important to ensure users that their information is secure in transmission. There are more and more forms of wireless devices coming on to the market weekly which makes the need for a robust security suite dire. There are several protocols for protecting wireless transmissions which are vulnerable while being transmitted between the user and the server or receiving device. WEP or Wired equivalent Privacy is a well known protocol for securing wireless transmission is an optional encryption standard implemented on the MAC layer which most NIC and access point vendors support. When WEP is activated, the NIC encrypts the frame body and CRC of each frame before transmitting. This is possible with what is called RC4 or stream ciphering. There is also an integrity check which is supposed to ensure that the frames are not modified in transit.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/11/2011 for the course IT/244 2 taught by Professor John during the Spring '11 term at University of Phoenix.

Page1 / 3

Checkpoint week 8 2 - Checkpoint Checkpoint WLAN IT 242 1 Checkpoint WLAN security is very important is that most transmissions occur over

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online