Академический Документы
Профессиональный Документы
Культура Документы
12.7.3. 802.11 Original Authentication Methods Extensible Authentication Protocol (EAP) for
authentication.
Open system authentication: VPN to ensure the message has not been altered.
Shared Key Authentication: mechanism WEP, • Advanced Encryption Standard (AES): used in
WPA, WPA2 and WPA3. WPA2, uses the Counter Cipher Mode with
Authentication Description
Block Chaining Message Authentication Code
Method Protocol (CCMP), allows destination hosts to
Wired Equivalent The original 802.11 specification
Privacy (WEP) designed to secure the data using the recognize if the encrypted and non-encrypted
Rivest Cipher 4 (RC4) encryption
method with a static key, it’s easy to
bits have been altered.
hack, no longer recommended and
should never be used. 12.7.7. Authentication in the Enterprise
Wi-Fi Protected A Wi-Fi Alliance standard that uses • RADIUS Server IP Address
Access (WPA) WEP, but secures the data with the
much stronger Temporal Key • UDP port numbers
Integrity Protocol (TKIP) encryption
algorithm. TKIP changes the key for • Shared Keys.
each packet, making it much more
difficult to hack.
12.7.8. WPA3
WPA2 Current standard for securing
wireless networks. It uses the Features:
Advanced Encryption Standard
(AES) for encryption. AES is • WPA3-Personal: Simultaneous Authentication
currently considered the strongest
encryption protocol. of Equals (SAE)
WPA3 Next generation of Wi-Fi security, all
devices use the latest security • WPA3-Enterprise: Commercial National
methods, disallow outdated legacy
protocols, and require the use of Security Algorithm (CNSA)
Protected Management Frames
(PMF). However, devices with • Open Networks: Opportunistic Wireless
WPA3 are not yet readily available.
Encryption (OWE)
• Internet of Things (IoT) Onboarding: