Wireless LANs are nearly everywhere. However, without some form of Wi-Fi security, anything you send across that WLAN is visible for all to see. INE expert instructor Keith Bogart provides a strong foundation for anyone looking to understand and better navigate quality Wi-Fi security.
In the first part of this series, we examined WEP as presented in our CCNA Wireless Course. To read that first part, click here. The WiFi Alliance introduced Wi-Fi Protected Access (WPA) in 2003 as a replacement technology for WEP. WPA is based on the 802.11i draft version 3. This improved technology relies upon Temporal Key Integrity Protocol (TKIP) to automate the changing of keys. Remember that a huge issue for WEP was the single, static key in use. Interestingly, WPA uses the RC4 encryption...