Looks like no one added any tags here yet for you.
A Wi-Fi network that does not require a password or key to connect, making it accessible to anyone in the vicinity. Data transmitted on open networks is unencrypted and visible to anyone with a wireless network card.
Open Wi-Fi Network
An encryption algorithm that uses a 56-bit key to encrypt data. It is now considered antiquated and insecure, as it can be compromised by brute force methods in less than a day.
Data Encryption Standard (DES)
A symmetric encryption algorithm that uses the DES algorithm three times in a row to encrypt data. While it increases the complexity of encryption, it can still be compromised, especially as more data is sent in a single session.
Triple Data Encryption Standard (3DES)
A highly secure form of encryption widely used today. It can use a 128-bit, 192-bit, or 256-bit key, with longer key lengths providing stronger security.
Advanced Encryption Standard (AES)
An early wireless security standard that aimed to provide the same level of security as a wired network. It uses a 40-bit or 104-bit encryption key, which can be easily compromised using brute force methods. It has been deprecated and is no longer recommended.
Wired Equivalent Privacy (WEP)
A wireless security standard designed to overcome the weaknesses of WEP. It uses a variable-length alphanumeric passphrase and employs the Temporal Key Integrity Protocol (TKIP) to generate a new encryption key for each packet, enhancing security compared to WEP.
Wi-Fi Protected Access (WPA)
The successor to WPA, introduced in 2004. It supports the Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP), which is based on the AES encryption standard. It became the standard for wireless security for over a decade.
WPA2
The latest wireless security standard, released in 2018. IT increases the minimum key strength for enterprise mode connections and eliminates the use of passphrases for personal-mode networks. It also implements forward secrecy and encrypts management frames for improved security.
WPA3
A security standard that provides network access control at the port level, whether physical or wireless, and uses authentication based on the Extensible Authentication Protocol (EAP).
802.1x
An authentication standard used in 802.1x that provides a framework for various authentication methods, including username and password or public key infrastructure (PKI) certificates.
Extensible Authentication Protocol (EAP)
The process of controlling access to a network based on the authentication and authorization of users and devices.
Network Access Control
A protocol used in 802.1x authentication that allows for centralized authentication, authorization, and accounting for network access.
Remote Authentication Dial-In User Service (RADIUS)
Rules and criteria set by a network administrator that determine the level of access and privileges granted to a user or device on a network.
Authorization Policies
Software programs designed to detect and remove malicious software, such as viruses, worms, and trojans, from a computer system.
Malware Scanners
The set of guidelines, policies, and configurations established by a company to ensure consistency and security across its network and systems.
Corporate Standard
A denial-of-service (DoS) attack where the attacker forces clients off of a wireless network, even without being on the network themselves.
Deauth Attack
The latest security protocol for wireless networks that encrypts management packets, providing better defense against deauth attacks.
WPA3 Security
An attack where the attacker sets up a rogue wireless network without security or authentication, allowing them to intercept and modify unencrypted data.
Fake Access
A secure connection established between a device and a VPN service, encrypting all traffic sent and received over a wireless network.
VPN Tunnel
Public wireless networks that do not require authentication or encryption, posing a significant security risk and should be avoided.
Unsecured Wi-Fi Hotspots