"Thinking inside the box " Wireless Security

in #computer8 years ago (edited)

This is a power-point I threw together that explains the differences of all the different wireless security's. Its good to know the differences I don't care who you are if you use computers then security is something that should be taken seriously.

Screenshot (14).png

Screenshot (15).png

Screenshot (16).png

Screenshot (17).png

Screenshot (18).png

Screenshot (19).png

Screenshot (20).png

Screenshot (21).png

Screenshot (22).png

Screenshot (23).png
Thank you for taking your time to take a look at this! I love to spread knowledge ;)
drawing.png
-RICKYG

Sort:  

informative, theoretically which protocols are broken and which aren't?

WEP was created first WPA2 being the most current replacement for all the others. But a lot of people still use WEP which accounts for alot of breaches. SO theoretically WEP is the most broken out of all of them.

Coin Marketplace

STEEM 0.20
TRX 0.25
JST 0.038
BTC 104300.05
ETH 3268.73
SBD 4.11