7040 Week 5 Discussion Comments

docx

School

Wilmington University *

*We aren’t endorsed by this school

Course

IST-7040

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by Admys

Report
Comment 1: Thanks for sharing the informative post! I would like to add a few points about WEP. The drawback of an out-of-date Wi-Fi encryption method of WEP is WEP only supports 64-bit or 128-bit encryption key sizes, which can be more easily decrypted than the larger 256-bit encryption key and WEP is limited to the use of hexadecimal characters, which only allow for numbers 0–9 and the letters A–F. The key length is therefore not very secure. Standard computers have the ability to hack these keys. References Chandra, Y. I., & Azis, N. (2021).  Wireless Network Security Using WEP (Wired Equivalent Privacy) Method With RC4 Stream Cipher Encryption.  Journal Information System, 1(2).  http://journal.teknikunkris.ac.id/index.php/jis/article/download/139/119 Comment 2: The Wired Equivalent Privacy protocol is a commonly used security standard for wireless devices that is designed to protect wireless communications privacy. WEP, on the other hand, has only a few drawbacks. As a result, unless there is no other option, WEP should not be utilized. Alphanumeric keys are used in WEP. Using the dictionary approach of entering alphanumeric combinations, hackers can discover the public and private keys. The keys are static and short (40 bits), making them simple to guess. Another issue with WEP is that the ICV (Integrity Check Value) algorithm is ineffective. WEP has the same problem with weak encryption. Weak keys have been discovered in RC4's WEP implementation. It establishes that there is more correlation between the key and the output with a weak key than there should be for adequate security. With weak keys, determining which packets were encrypted is simple. A passive attack can take advantage of this deficiency. References Chandra, Y. I., & Azis, N. (2021).  Wireless Network Security Using WEP (Wired Equivalent Privacy) Method With RC4 Stream Cipher Encryption.  Journal Information System, 1(2).  http://journal.teknikunkris.ac.id/index.php/jis/article/download/139/119 Comment 3: The wireless networks are the networks that do not require physical connections to communicate and share information. These networks are faced by a number of vulnerabilities which include tapping, eavesdropping, hacking and the lack of a well-defined boundary (Soper, 2013 October 29). Some of the ways of addressing these vulnerabilities is using the WPA 2 that offers proper privacy protection for the data and information within the network. Apart from that, the network should be encrypted to ensure that any communications or data shared over the network cannot be tapped into by another party.
References Chandra, Y. I., & Azis, N. (2021). Wireless Network Security Using WEP (Wired Equivalent Privacy) Method With RC4 Stream Cipher Encryption. Journal Information System, 1(2). http://journal.teknikunkris.ac.id/index.php/jis/article/ download/139/119
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help