Wireless Security Tecniques: Unwanted Access To The Network
Wireless Security Tecniques: Unwanted Access To The Network
Wireless Security Tecniques: Unwanted Access To The Network
WEP 128
-an enhance encryption protocol combining a 104-bit key and
a 24-bit initialization vector.
WEP 64
-the first generation security standard for wireless network.
-could be exexploited because of an encryption key that was
vulnerable to decoding.
No security
-may leave your wireless network completely vulnerable to
attack.