SIZ Education | Know the Differences Wi-Fi Security WEP, WPA, and WPA2 Personal vs Enterprise by @kinghearts | 20% payout to @siz-official

in Steem Infinity Zone3 years ago

Hello all friends in the Steem Infinity Zone.

This time Meet me again @kinghearts, today I will try to discuss about Education again, which is the second time I'm making or writing about education, I hope you can understand it easily.

PicsArt_10-29-01.11.14.jpg
Image Source

In this digital era, everyone is now using a wireless network (WiFi) every time every second even. Although wifi makes our daily activities easier, it turns out that wireless networks are very vulnerable to security problems on this network. Fortunately, we are now familiar with WEP, WPA, and WPA2 personal vs. enterprise which are now present as security options on spacer wireless.

These three things are the types of WiFi security that are widely used today. It refers to a wireless encryption protocol that protects information sent and received over the network on a wireless network. Now let's try to find out what are the advantages of the three types, and find out which one is the best for you to use every day.
C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQRqKhAHHMT6UxacBhywrtyAQA9uagQvbDriLncoyixgvuZP3y8qfFPhY2FSAJ1Cf6bkttqXWea.png

Do you all know what are the types of wireless security?



  • Wired Equivalent Privacy Protocol or often referred to as "WEP"

images(50).jpgImage Source

This is the first type of wireless security and is considered the least secure to use of all existing protocols. Although it is easy to hack, WEP is the most widely used in modern times until now. The reason why WEP is still used is usually because they are still using the old device, the network administrator has not changed the security on the default network, or the device has never supported a newer security system than WPA.

  • WiFi Protected Access Protocol or often referred to as WPA

main-qimg-40d30b923eec302b00789eacde12e99b-lq.jpgImage Source

WPA is present as the successor of WEP as a result of the weakness of the system. WPA is also designed with various components of Temporal Key Integrity Protocol encryption or often referred to as TKIP which can then be replaced by Advanced Encryption Standard or often referred to as AES. However, it turns out that WPA is still adopting some of the WEP features, which in the end makes the WEP protocol considered to be never safe.

  • WiFi Protected Access II protocol or often referred to as WPA2

images(52).jpgImage Source

WPA2 is a successor to be able to replace the old WPA. One of the most significant changes between WPA and WPA2 is the use of the AES and CCMP algorithms instead of TKIP. This is what makes WPA2 the most secure protocol today compared to the old WPA and WEP.

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQRqKhAHHMT6UxacBhywrtyAQA9uagQvbDriLncoyixgvuZP3y8qfFPhY2FSAJ1Cf6bkttqXWea.png

You know what is the difference between WPA2 personal vs enterprise?



images(54).jpgImage Source

After you know what the difference between types of security is, of course you should also know that the protocol in WPA2 is better for use today. What's more, the security system is very guaranteed when you send even very confidential personal or business information.

Currently, there are two versions of WPA 2, namely WPA2 personal and WPA2 enterprise. Both of these WPAs can both use one of the methods of one of them on even very strong encryption. it can also secure our data to be sent over a wireless network. However, there is a difference between the two of them.

The main difference between WPA2 personal vs WPAw enterprise is in the stage called authentication. Most of the WiFi networks now use WPA2 which is Personal, such as the use of wifi at home and small businesses such as coffee shops. In this so-called personal mode, the concept is very simple and it also uses a configuration called PSK for its own authentication. In addition, WPA2 Personal also uses one password for all users who will connect.

Meanwhile WPA2 Enterprise is widely used mostly in large companies. This method will not be suitable for use on a home range because it can use a unique username and password for each user and can require a server that is RADIUS authentication. So that every user who wants to use WiFi must first have access that can connect to the database first.

As a result, by using this method, if later on there are employees who resign or their laptops are lost, the company can immediately deactivate the user's account in the company database data so that no one can connect to the network at the company.

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQRqKhAHHMT6UxacBhywrtyAQA9uagQvbDriLncoyixgvuZP3y8qfFPhY2FSAJ1Cf6bkttqXWea.png

20% Payout to @siz-official

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQRqKhAHHMT6UxacBhywrtyAQA9uagQvbDriLncoyixgvuZP3y8qfFPhY2FSAJ1Cf6bkttqXWea.png

Special Thanks To Steem Infinity Zone Team

Cc.-
@cryptokraze
@siz-official
@vvarishayy
@suboohi
@faran-nabeel

Thanks For Visiting My Post
Best Regards
@kinghearts

About Me


qjrE4yyfw5pEPvDbJDzhdNXM7mjt1tbr2kM3X28F6SraZgsVE4TWFxK9sqQXv9XirMGxAqhv2gFHBnxgS3JZH8dHJJoAiuh4pzBbdnnfKKW1JxQNeieceozn.png


C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQRqKhAHHMT6UxacBhywrtyAQA9uagQvbDriLncoyixgvuZP3y8qfFPhY2FSAJ1Cf6bkttqXWea.png

Sort:  

Upvoted! Thank you for supporting witness @jswit.
default.jpg

 3 years ago 

Good working dear friend keep it up bro and keep learn with our steem fellows and friends.

Regards, Faran Nabeel

Coin Marketplace

STEEM 0.19
TRX 0.15
JST 0.029
BTC 63248.94
ETH 2576.33
USDT 1.00
SBD 2.85