"Thinking inside the box " Wireless Security

in #computer7 years ago (edited)

This is a power-point I threw together that explains the differences of all the different wireless security's. Its good to know the differences I don't care who you are if you use computers then security is something that should be taken seriously.

Screenshot (14).png

Screenshot (15).png

Screenshot (16).png

Screenshot (17).png

Screenshot (18).png

Screenshot (19).png

Screenshot (20).png

Screenshot (21).png

Screenshot (22).png

Screenshot (23).png
Thank you for taking your time to take a look at this! I love to spread knowledge ;)
drawing.png
-RICKYG

Sort:  

informative, theoretically which protocols are broken and which aren't?

WEP was created first WPA2 being the most current replacement for all the others. But a lot of people still use WEP which accounts for alot of breaches. SO theoretically WEP is the most broken out of all of them.

Coin Marketplace

STEEM 0.15
TRX 0.15
JST 0.028
BTC 54034.48
ETH 2262.26
USDT 1.00
SBD 2.31