Wpa2 357 422 wpa2 was released a year after wpa and

Info icon This preview shows pages 42–44. Sign up to view the full content.

WPA2 3:57-4:22 WPA2 was released a year after WPA and uses a much more complex and effective encryption mechanism. Instead of using RC4 and TKIP, WPA2 uses the Advanced Encryption Standard, or AES.AES is a very strong encryption method and provides the best wireless security. This is the default encryption used by most wireless access points and should be the encryption method used in almost all situations. Encryption and Authentication 4:23-5:07 Wireless access points use the encryption method in conjunction with the authentication method to create a more secure wireless network. So, when selecting a wireless security option on an access point, you might see WPA2 Personal or WPA2 Enterprise as the wireless security option. The first part is the encryption method. The second is the authentication method. The personal ending means the network will use shared key authentication. WPA2 Personal is sometimes written as WPA2 PSK. When you see Enterprise, this means 802.1x authentication is used,which requires a RADIUS or EAP server. WPA2 Personal is used in most wireless network environments. WPA2 Enterprise is typically used by larger companies or organizations. Additional Security Steps 5:08-6:24
Image of page 42

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

In addition to configuring the encryption and authentication method on a wireless access point, there are other steps that should be taken to further secure a wireless network. One of the most important steps is to change the default administrator password. To make configuration easier, wireless access points are preconfigured with a default password.Often times, the password is simply "admin" or "password". Even if it's a bit more complex, there are websites that have a list of all the default passwords used by each access point manufacturer.Because of this, the first thing you should do when configuring a network device is change the default password. Another thing you can do is change the default SSID. Default SSIDs, often times, contain informationabout the type of access point. This information might be used to exploit known vulnerabilities in that particular model. You can also disable the SSID broadcast, if necessary. This makes it so the SSID isn't in the list of available networks on a wireless device. This is mostly a protection against the casual passerby. Even with the SSID broadcast disabled, it's actually relatively easy to obtain the SSID. MAC address filtering is another security layer you can add. However, it's often times more of a nuisance for the person managing the network. MAC addresses of devices can be easily captured and spoofed by a determined hacker. Summary 6:25-6:44 So, those are the different wireless security measures that are used to protect a wireless network. To review, wireless networks use both authentication and encryption to secure communications.Authentication and encryption are used in conjunction with each other. WPA2 Personal is the most common type of wireless security and uses AES encryption with shared key authentication.
Image of page 43
Image of page 44
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '14
  • Computer network, Local area network, Network topology, Metropolitan area network

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern