百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

Protecting Your Wireless Communication

by Clevin Wong

In recent years, due to the proliferation of low cost mobile devices like notebook/netbook computers and Wi-Fi phones, more and more people use these devices for communication and Internet access via the wireless networks.

However, wireless networks are insecure by nature. In wireless networks, data transmissions are broadcast over radio waves through the open air. Hence, they are more susceptible to security attacks (e.g. eavesdropping, unauthorized access) than wired networks [1]. Data interception and tampering is easy for anyone with the proper hardware and/or software tools and knowledge.

Therefore, it is important to provide additional measures to protect the communication to ensure the data confidentiality and integrity of your data. Data encryption and user authentication are two of the basic security measures. Data encryption protects the vulnerable wireless link between client devices and access points by encrypting all data in the transmission. User authentication protects against unauthorized access to the wireless network. Currently, there are three common protection methods for wireless networks, namely, WEP, WPA and WPA2.

Wired Equivalent Privacy (WEP)

WEP was introduced in 1997, intended to give wireless networks the equivalent level of privacy protection comparable to that of a traditional wired network. However, due to its imperfect encryption key implementation and lack of authentication, several serious security weaknesses of WEP have been identified and publicly reported since 2001 [2]. Today, with publicly available tools, hackers may intercept and modify the transmissions protected by WEP within minutes. Hence, WEP is regarded as insecure and vulnerable to network attacks. It is only a little better than having no encryption. WEP was deprecated as a wireless privacy mechanism in 2004 though it still is being widely used to-day due to many legacy mobile devices support only WEP.

Wi-Fi Protected Access (WPA)

Owing to the weaknesses of WEP, WPA was introduced in 2003 to address all the known weaknesses of WEP. WPA uses a strong encryption technology called Temporal Key Integrity Protocol (TKIP) to overcome the security weaknesses of WEP. It also bundles with authentication service that WEP does not offer. WPA provides assurance that user data will be protected and that only authorized users may access the wireless networks. Although considered as a secure method, it still has its weaknesses chiefly on the TKIP protocol with weak passwords [8][9].

Wi-Fi Protected Access 2 (WPA2)

WPA2 was introduced in 2004 as the next generation of WPA [4][5]. It is based on the ratified IEEE 802.11i standard. WPA2 is backward compatible with WPA. WPA2 enhances the encryption strength of WPA by replacing the TKIP protocol with the Advanced Encryption Standard (AES) encryption algorithm. AES satisfies the U.S. government security requirements and complies with the Federal Information Processing Standards (FIPS) 140-2 standard. Today, WPA2 is by far the strongest security system available for wireless networks.

Wireless Networks in CityU

The CityU wireless local area network (WLAN) was introduced in 1997 and matured in 2006. Currently two types of connections are supported: (1) Secure connection with data encryption via WPA/WPA2, and (2) Insecure connection without data encryption via web logon. The CSC strongly recommends users to the secure WPA/WPA2 connection for the sake of data protection. The insecure connection should be avoided unless your device does not support WPA/WPA2 and data privacy is unimportant. For details, please refer to the CityU WLAN page [6].

References:

博彩网导航| 百家乐国际娱乐| 威尼斯人娱乐场 送2688元礼金领取lrm64| bet365主页| 现金百家乐官网下载| 劳力士百家乐的玩法技巧和规则 | 百家乐官网视频双扣下载| 菲律宾百家乐的说法| 大发888娱乐城在线客服| 玩百家乐官网澳门368娱乐城 | 真人百家乐蓝盾娱乐平台| 图木舒克市| 真人百家乐蓝盾赌场娱乐网规则 | 百家乐官网咋个玩的| 罗盘24山图是什么| 大发888游戏平台3403| 网上百家乐官网的赌博网站| 巨星百家乐的玩法技巧和规则 | 粤港澳百家乐官网赌场娱乐网规则 | LV百家乐官网赢钱LV| 博彩公司排名| 试玩百家乐官网帐| 免费百家乐官网规律| 大发888娱乐城菲律宾| 百家乐投注方法投资法| 百家乐官网投注方法投资法| 玩百家乐犯法| 大发888站| 开心8百家乐现金网| 澳门百家乐官网赌客| 拉斯维加斯国际娱乐| 深圳百家乐官网的玩法技巧和规则| 赢钱的棋牌游戏| 百家乐博弈之赢者理论| 爱拼百家乐现金网| 百家乐官网赌博牌路分析| 宁蒗| 百家乐博弈之赢者理论| 百家乐游戏如何玩| 百家乐娱乐城体育| 百家乐官网如何切牌好|