tailieunhanh - cwts certified wireless technology specialist official study guide exam pw0 070 phần 9

làm cho nó một giải pháp yếu để sử dụng với các mạng không dây hiện đại. Với những triển khai ban đầu của mạng không dây dựa trên tiêu chuẩn, WEP là giải pháp duy nhất có sẵn, do đó làm cho nó rất phổ biến. Tại thời điểm đó, khả năng để crack WEP đã có sẵn nhưng không có nghĩa là bất cứ ai có thể làm điều đó. | Encryption WEP TKIP CCMP 357 against casual eavesdropping. As discussed this encryption mechanism is considered legacy and was compromised early on making it a weak solution to use with modern wireless networks. With early deployments of standards-based wireless networking WEP was the only solution available thereby making it very popular. At that time the capability to crack WEP was available but that did not mean anyone could do it. Initially cracking WEP required a large amount of data some knowledge of the process and usually a software program to extract the WEP key. Newer technology has made cracking WEP a very simple process. WEP can be cracked in minutes rather than hours days or weeks. The fact that WEP is available in two key lengths 64-bit or 128-bit makes no difference to the experienced intruder. WEP uses the RC4 stream cipher for bit-level encryption. The problem with WEP does not lie in RC4 but in how it was used in the encryption process. One reason WEP is vulnerable to intrusion because of something called an initialization vector IV . The 24-bit IV is broadcast in the clear or unencrypted. This being the case it exposes a weakness in the way WEP was designed thereby allowing it to be compromised. Is WEP Still Used As a general rule it is best not to use WEP as a security measure for protection of a wireless network and its users. However there are still many large-scale deployments that use devices with wireless networking that have limited capabilities when it comes to security. WEP may be the only security option they have. If upgrading the devices to something that supports higher-level security is not an option the organization may have no choice but to use WEP. If this is the case it is important for the network administrator to use appropriate device segmentation for the WEP-enabled devices in order to not compromise the entire network infrastructure. One way to do this is to consider the use of a virtual local area network VLAN . This gives

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.