Securing your Wireless Network
Securing your Wireless Network
Here are a few different ways to maximize the security of your wireless network and protect your data from unwanted intrusions. This section is intended for the home, home office, and small office user. At the time of publication, three encryption methods are available.
Encryption Methods:
Name | |||
| Equivalent Privacy | Encryption | Access |
|
|
|
|
Acronym | WPA | ||
|
|
|
|
Security | Good | Better | Best |
|
|
|
|
Features | Static keys | Static keys | Dynamic key |
|
|
| encryption and mutual |
|
|
| authentication |
|
|
|
|
| Encryption keys based | Added security | TKIP (temporal key |
| on RC4 algorithm | over | integrity protocol) |
| (typically | using a key length | added so that keys are |
|
| of 104 bits, plus 24 | rotated and encryption |
|
| additional bits of | is strengthened |
|
|
| |
|
| data |
|
|
|
|
|
26