Cellular Networking



Cellular Networking

Cellular Networking

🔥🔥🔥SMASH👊 THAT🤜 LIKE👍 BUTTON🔥🔥🔥 and don’t forget🤦‍♀️ to 👍subscribe🔔🔥🔥🔥
https://imp.i384100.net/9WaKnY
Use above link to earn a certificate or quizzes and supplementary reading.

When you’re sending data over a wired link, your communication has a certain amount of inherent privacy. The only devices that really know what data is being transmitted are the two nodes on either end of the link. Someone or some device that happens to be in close proximity can’t just read the data. With wireless networking, this isn’t really the case, since there aren’t cables, just radio transmissions being broadcast through the air, anyone within range could hypothetically intercept any transmissions, whether they were intended for them or not. To solve this problem, WEP was invented. WEP stands for Wired Equivalent Privacy, and it’s an encryption technology that provides a very low level of privacy. Actually, it’s really right there in the name, wired equivalent privacy. Using WEP protects your data a little but it should really only be seen as being as safe as sending unencrypted data over a wired connection. The WEP standard is a really weak encryption algorithm. It doesn’t take very long for a bad actor to be able to break through this encryption and read your data. You’ll learn more about key lengths and encryption in a future course. But for now, it’s important to know that the number of bits in an encryption key corresponds to how secure it is, the more bits in a key the longer it takes for someone to crack the encryption. WEP only uses 40 bits for its encryption keys and with the speed of modern computers, this can usually be cracked in just a few minutes. WEP was quickly replaced in most places with WPA or Wi-Fi Protected Access. WPA, by default, uses a 128-bit key, making it a whole lot more difficult to crack than WEP. Today, the most commonly used encryption algorithm for wireless networks is WPA2, an update to the original WPA. WPA2 uses a 256-bit key make it even harder to crack. Another common way to help secure wireless networks is through MAC filtering. With MAC filtering, you configure your access points to only allow for connections from a specific set of MAC addresses belonging to devices you trust. This doesn’t do anything more to help encrypt wireless traffic being sent through the air, but it does provide an additional barrier preventing unauthorized devices from connecting to the wireless network itself.

This video is part of a series where we bring the best videos to you, we have made some modifications to this video.
The creator of this course is Google
As per the Coursera FAQ section of the Google IT Support Professional Certificate:
content in the Google IT Support Professional Certificate is licensed under a Creative Commons Attribution 4.0 International License.

This video is for information purposes only
This is not affiliated with Google
Note: We earn a commission when you click on the link and or buy .

Comments are closed.