I discussed inside a previous article the drawbacks and weakness of the wireless network using WEP (wired equivalent privacy) as a way of security. It’s a of low quality way of securing a radio network. But when WEP may not be good and it is only marginally much better than no security whatsoever, the other options have i got apart from running wires throughout my office or home?
In case your network devices supports WPA (Wi-Fi protected access), then go ahead and put it to use! However, all of your devices (entry way, adapters, etc) must have the ability to support WPA. WPA supplies a much greater degree of security than WEP and can perform a better job keeping unauthorized users off your wireless network.
There’s two primary implementations of WPA: WPA and (surprisingly) WPA2. Even they’re variants on a single technology and they’re not interchangeable or compatible. Just like WEP, all of the devices around the network must offer the standard selected or they won’t be able to talk with another devices around the network.
The main difference within the two alternative WPA technologies is incorporated in the cipher (file encryption), how a information is encoded or encrypted prior to it being sent over the network. WPA is really a much more powerful approach to securing your network than WEP. WPA utilizes a Temporal Key Integrity Protocol (TKIP) and offers an enormous improvement over file encryption and encoding supplied by WEP.
WPA2 is definitely an even more powerful approach to file encryption than WPA and this ought to be used if the choice is open to you on all devices. WPA2 uses funding File encryption Standard (AES) because of its file encryption and you’ll even see references for this acronym as a kind of network security. You’ve now learned that AES is only a approach to file encryption found in WPA2. This really is virtually a foolproof file encryption method and it has provided defense against the greatest degree of online hackers and snoops.
You might even see other references to WPA and WPA2. WPA Personal or WPA PSK (pre-shared key) would be the at their peak references and therefore are used interchangeably. There’s additionally a WPA Enterprise that gives complex algorithms and automatic key changes. This is made for large business with a lot of users and sources and could be overkill for that home or small office user.