Preview

Wep vs Wpa

Satisfactory Essays
Open Document
Open Document
554 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wep vs Wpa
Abstract
Some of you reading this may be wondering “what is WEP or WPA; or what the difference is?” Well I am going to tell you the difference in this paper. I will describe what WEP is. & what WPA is. Then I will tell you the pros and cons of each and then tell you which one is better in my opinion based on the facts presented. Table of Contents
Title Page……………………………………………………………………………Pg1
Abstract………………………………………………………………………………Pg2
WEP……………………………………………………………………………….…Pg4
WEP Pros/Cons………………………………………………………………………Pg4

WEP
WEP stands for Wired Equivalent Privacy. WEP is part of the IEEE 802.11 wireless networking standard. WEP is a security protocol that encrypts transmitted data in a wireless network. WEP was an early attempt at securing wireless networks but now there are better ways. WEP has 3 settings: off (no security), 64-bit (weak), and 128-bit (better). WEP is not necessary if you are using a wireless network only for a gaming console such as a playstation or an xbox with no computers.
WEP Pros
There are few pros to using WEP. The biggest pro is that it is easier to configure than the other encryption methods. Another good thing is that there is no extra performance cost to encrypting the longer 128-bit key.

WEP Cons
There are many more cons the pros when it comes to WEP. The first for example is that it is very easy to crack. While there is no cost to performance there is a cost to transmitting the extra key over the network. The 128-bit increases the size of the data over the network which does slowly decrease performance. WPA WPA is a wireless security encryption with greater protection than WEP. It stands for Wi-Fi Protected Access. Most wireless networks should use either WEP or WPA. WPA-PSK is not much more difficult to configure than the older WEP, but is not available on some older products. All computers, access points, and wireless adapters must use the same type of security. WPA operates in either WPA-PSK mode (aka Pre-Shared

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Access point - is a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By implementing the encryption between workstations and WAP you can protect the confidentiality of data transmissions.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3230 Lab 4

    • 528 Words
    • 2 Pages

    8. WEP's major weakness is its use of static encryption keys. When you set up a router with a WEP encryption key, that one key is used by every device on your network to encrypt every packet that's transmitted. But the fact that packets are encrypted doesn't…

    • 528 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Standard wireless network security that runs on matching wep keys for example. Transmisions are also encrypted ahead of time as privacy is priority here.…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    a. Wireless networks are less secure than wired networks, both in terms of access and in terms of user information. Because the information to and from the computer is broadcast instead of traveling over a wire, it is much easier to intercept.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 3 P3

    • 1666 Words
    • 7 Pages

    A wireless access point (WAP) is a device that usually connects to a router and acts like a switch. WAPs utilise wifi to connect to devices to allow communication between them. WAPs are used to extend the wireless reach of a network or to allow wireless access to that network. Unlike a router or switch, the WAP does not filter data and has no inbuilt firewall, so does not add to the security of the…

    • 1666 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 8 Questions

    • 306 Words
    • 1 Page

    2. To prevent outsiders from exploiting connected resources and sniffing data that is being transmitted. The best encryption method is WPA2.…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    Another way to protect your WLAN is with WPA (WI-FI Protected Access). WPA is an upgrade to the WEP(Wired Equivalent Privacy). WEP regulates access to wireless network through a devices hardware-specific MAC address.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Network Final

    • 358 Words
    • 2 Pages

    Lan will use WPA2 authentication for all wireless devices. WPA2 is important as it can be configured for any device including phones and wireless printers…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The first type of wireless radio wave transmission to describe in this paper is 802.11B. The 802.11B was an amendment to the original 802.11 standard released in because the original did not have fast enough speeds to be sufficient to support the needs that the technology required. 802.11B added speeds of 5.5 and 11 Mbps. The 802.11B standard also supports wireless devices that are up…

    • 764 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Application Requirements

    • 274 Words
    • 2 Pages

    |Two current applications of WLANs |Used in Home networks and businesses. Supports wireless printing |…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lust by Susan Minot

    • 689 Words
    • 3 Pages

    Lust is having a self-indulgent sexual desire. Susan Minot portrayed the mind of a promiscuous high school female perfectly. Lust is powerful and seductive, but it's inherently selfish and opposed to love. For many girls who are having sex with different boys they can identify with the desire to be needed. The characters in "Lust" are written in a way to highlight the dysfunction and disconnection of everyone involved. The narrator herself is nameless and faceless, making the reader believe that she has already somehow disappeared, just as the men in her life have made her disappear after having sex. Similarly, the men are listed in a brief and are identified only by their sexual acts or by other, easily objectified characteristics. What makes the story sad is the girl knows she is basically nothing. Many people who have casual sex start to feel this way, there is usually something missing in their lives. While reading the story I kept asking myself "where are her parents" after realizing that she is in boarding school things suddenly became clear.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The colonial establishment of European in North America began early as the 1490 into the1500s all the way into the 1700s. By the beginning of the eighteen century, there were three main colonial empires in the New World; the British, French, and Spanish empires. They had various differences in societal, economic, political, and religious outlooks.…

    • 924 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Wifi- Health Effects

    • 1297 Words
    • 6 Pages

    What other devices emit microwave radiation? There are many other devices that emit the same radiation as Wi-Fi. These include:…

    • 1297 Words
    • 6 Pages
    Good Essays