Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

What’s the difference between WEP and WPA mobile security solution. I have creat

ID: 3738053 • Letter: W

Question

What’s the difference between WEP and WPA mobile security solution. I have created a table for you to complete to help you understand the differences. Which one will prevent a man in the middle attack and why.

WEP

WPA

Key length

key creation

Encryption

Initialization Vector – who has it and what does it do

Security flaws

Pin flaws

Temporal Key Integrity Protocol – who has it and what does it do

Message Integrity Check – who has it and what does it do

Which one is preferred

Give an example when an Open Method for Preshared keys is used.

Give an example when Preshared key (PSK) is used

Why is WPA2 more secure than WPA

WPA

WPA2

Encryption Method (same or different)

Key length

Name of 48-bit value

MIC value length and what does it protect

Compare and Contrast Access Point (AP) Types

Fat Client

Thin Client

Benefit

Disadvantage

Standalone

Controller

Benefit

Disadvantage

Give an example of when you have been encountered a Captive Portal AP. What does Captive Portal AP mean?

What is Bluetooth wireless technology?

What is the difference between Basic Rate/Enhanced Rate Data Rate and Bluetooth Low Energy

What it is

How to Prevent

Bluejacking

BlueSnarking

8.NFC (Near Field Communication) is a wireless communication between 2 devices. Give an example for each of the risks and what you can do to prevent it.

Example

Risk

Defense

Man in the Middle

Eavesdropping

Data Theft

9.WLAN Enterprise Attacks

Attack type

Definition

Defense

Evil Twin

Intercepting Data

Wireless Replay Attack (hijacking)

Rogue AP

Man in the middle

Jamming

Disassociation Attack

10.Methods to protect WLAN

                                                          

Method

Explanation

Vunerabilites

MAC Address Filtering

SSID Broadcasting

WEP

WPA

Key length

key creation

Encryption

Initialization Vector – who has it and what does it do

Security flaws

Pin flaws

Temporal Key Integrity Protocol – who has it and what does it do

Message Integrity Check – who has it and what does it do

Which one is preferred

Explanation / Answer

Difference between WEP and WPA mobile security solution as follows -

WEP is a weak security standard, The password it uses can often be cracked in a few minutes with a basic laptop computer and widely available. WEP is an old IEEE 802.11 standard from 1999, which was outdated in 2003 by WPA, or Wi-Fi Protected Access. WPA was a quick alternative to improve security over WEP.

WEP is vunerable to Firesheep. With manual WEP and a single key, any station with the key can decrypt everything on the network. WEP keys can be stolen or 'cracked' easily. Firesheep can be easily extended to work on a WEP network.WEP is the oldest and weakest of wifi encryption. It's the lowest level protection using a single key on the network. It's the easiest to crack.

WPA (wi-fi protected access) and WPA2 are the most recent (though not new). They use scrambled keys and user authentication. Though better, it's still somewhat vulnerable.Hence,WPA prevent man in middle attack than WEP.

WEP (Wired Equivalent Privacy) WPA  (Wi-Fi Protected Access) Older equipment that can use. might not be able to use. Required less processing power Required more processing power Not as strong s WPA provide stronger wireless data encryption 64 or 128 bits encryption key 48-bit keys with more combinations. A security protocol for wireless networks introduced in 1999 to provide data confidentiality comparable to a traditional wired network. A security protocol developed by the Wi-Fi Alliance in 2003 for use in securing wireless networks; designed to replace the WEP protocol. Through the use of a security algorithm for IEEE 802.11 wireless networks it works to create a wireless network that is as secure as a wired network. As a temporary solution to WEP's problems, WPA still uses WEP's insecure RC4 stream cipher but provides extra security through TKIP. Wireless security through the use of an encryption key. Wireless security through the use of a password. Open system authentication or shared key authentication Authentication through the use of a 64 digit hexadecimal key or an 8 to 63 character passcode.
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote