Question: Provide a constructive response to the following paragraph based on its concept. An encryption method for IEEE 802.11 wireless networks is called WEP it is
Provide a constructive response to the following paragraph based on its concept. An encryption method for IEEE 802.11 wireless networks is called WEP it is basically ancient and significantly breakable. The main goal of WEP is to guarantee data secrecy on wireless networks to the same extent as traditional LANs. WEP guards against wireless communication eavesdropping. It makes an effort to stop unauthorized users from accessing a wireless network. It is dependent upon an AP and a mobile station sharing a secret key. Before being sent, packets are encrypted with this key. Verifying the integrity of a packet during transmission is done by performing an integrity check. WPA is a security protocol defined by the 802.11i standard and uses Temporal Key Integrity (TKIP), which employs the RC4 stream cipher encryption with 128 bit keys and 64 bit MIC to provide robust encryption and authentication, passes messages through a Message Integrity Check (MIC) before messages are sent, WPA offers higher data encryption security than WEP. AES is a cipher blocker and stands for Advanced Encryption Standard. It is called a "block" cipher because it encrypts in blocks of bits rather than bit-by-bite like a stream cipher, and it is symmetric in the sense that only one key is needed to decode the data. Because it uses 256-bit keys, brute force assaults cannot break it. It is currently the strongest encryption system. Before considering a specific encryption, technique there are a few things to consider such as the organization's specific needs, the types of data that will need to be stored, the size of the organization, and the guidelines stated for protecting the type of data being stored. I would recommend AES to an organization as it is the strongest encryption type for the time being. If it was a small organization with not a lot of online presence, I would recommend the WPA and TKIP
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
