Wep

The default WLAN security option is 802.11. Using an RC4 cipher with 40- or 128-bit key length, WEP ca on a busy network. One such tool, AirSnort, allows you to automate the attack and is available at http:/

In addition to the cryptographic weaknesses of WEP, key management is very difficult. WEP only offers keys and, as such, requires that the keys be provisioned in advance on each device requiring connectivi device is compromised, the keys must be reconfigured on all devices.

Because of the security considerations of WEP, it is really a security-through-obscurity feature as oppos security benefit. It is, however, better than nothing. If you absolutely must use WLANs and cannot rely alternatives discussed later, use 128-bit WEP and change the keys as often as you can.

From a security perspective, you should consider any data transmitted on a network running basic WEP that network's access accordingly. This can be done with firewalls, ACLs, or some form of identity contro

Some cases that require the use of static WEP include devices with no support for security alternatives. for example, might need to run over 802.11 but might not have the ability to run any security extensior security of those transactions falls completely on the application. This is unfortunate because the same prevent the use of security extensions on a low-power WLAN device often prevent the use of application computational complexity. The section on L3+ security techniques later in this chapter provides more de 11-7 shows the basic WEP design.

Figure 11-7. Basic WEP Design

Figure 11-7. Basic WEP Design

100 SEO Tips

100 SEO Tips

100 SEO Tips EVERY SEO Enthusiast Should Know. This Report 100 SEO Tips will help you to Utilize These Tips to Dominate The Search Engine Today.

Get My Free Ebook


Post a comment