I. Define the concept of Wired Equivalent Privacy (WEP) and how it applies to information security systems

Question:

I. Define the concept of Wired Equivalent Privacy (WEP) and how it applies to information security systems and cryptography.
• WEP was an early attempt to provide security with the 8002.11 network protocol.
• It is now considered too cryptographically weak to provide any meaningful protection from eavesdropping.
• An intruder who collects enough data can threaten a WEP network in just a few minutes by decrypting or altering the data being transmitted, or by forging the WEP key to gain unauthorized access to the network.
• WEP also lacks a means of validating user credentials to ensure only those who should be on the network are allowed to access it.
II. Compare and critique the reasons why WEP is too weak for use in most network settings.

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Principles Of Information Security

ISBN: 9780357506431

7th Edition

Authors: Michael E. Whitman, Herbert J. Mattord

Question Posted: