Wireless communications are particularly susceptible to eavesdropping. For example, a hacker can search for unprotected wireless networks by driving around with a laptop configured to receive and capture wireless data transmission.
In this topic, therefore, we introduce to you some common protection mechanisms that apply to wireless networks. These include:
- Wired Equivalent Privacy (WEP)
- IEEE 802.11i (commonly known as "Wi-Fi Protected Access")
At the end of this section, you will have a lab activity in which you can capture and analyse some wireless LAN traffic.
- 840 reads