WEP or | A security protocol for wireless local area networks. WEP was |
Wired | designed to provide the same level of security as that of a |
Equivalent | wired network, which is inherently more secure than a wireless |
Privacy | network because wired networks are easily protected against |
| unauthorized access. Wireless networks use radio waves to |
| communicate and can be vulnerable to unauthorized users. |
| WEP provides security by encrypting data over radio waves so |
| that it is protected as it is transmitted. However, it has been |
| found that WEP is not as secure as once believed. |
| Note: If one part of a wireless network has WEP enabled, they |
| all must have it enabled with the same key or they cannot |
| communicate. |
128 Bit / 64 Bit | This is the 64 or 128 bit WEP key that must match other |
WEP Key | Nodes’ encryption keys in order to communicate: 10 hex |
| characters for 64 bit (40 |
| characters for 128 bit (104 |
| must use the same key values for devices to communicate with |
| each other. |
WLAN or | A LAN that uses |
Wireless Local | between nodes, rather than telephone wires, etc. |
Area Network |
|
WPA
Protected
Access)
WPA2
(or IEEE 802.11i)
A network security protocol that uses improved authentication and temporal keys. It was created to address the weaknesses of WEP encryption.
A network security protocol with stronger encryption than WPA. It was created to address the weaknesses of WEP encryption.