Wpa2 personal vs.wpa2 enterprise9/3/2023 Unfortunately, the initial developers were really not experts in security, and the security protocol that they developed, known as Wireless Equivalent Privacy (WEP), was soon easily overcome by unsophisticated attacks with attackers taking under an hour to discover the key. That is why, right from the outset, a great deal of importance has been attached to wireless network security.īy 1999, the first version of the IEEE 802.11 standard – which constitutes the basis for WLAN network operation – already devoted a section to describing the procedures to achieve a secure network. With high-gain antennas, it is possible to listen in on the data that passes through an office from outside the building. The nature of electromagnetic waves is such that anyone in a wireless network can receive the data sent over the air.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |