About This Chapter
Wireless Network Security - Chapter Summary
If you're looking for an overview of wireless network security concepts, then you're in the right place. This chapter includes a collection of short lessons that break down the fundamentals of wide area network topologies, WLAN protocols, wireless protected access and more. You'll also learn about the functions of wireless communication transmission methods, such as Bluetooth, Wi-Fi and hotspots. Following each lesson is a short quiz that helps you retain the information. Take the chapter exam to master these concepts, and use any computer or mobile device to access these study resources. Upon completion of the chapter, you should be equipped to:
- Define WEP network security
- Secure wireless networks
- Recognize the components and characteristics of wireless transmission
- Identify short-range and medium-range wireless communication methods
- Assess several wide area network topologies
- Define the components of wireless protected access (WPA)
- Differentiate between WPA2 AES and TKIP
- Compare types of Wi-Fi encryptions and WLAN protocols
- Explain the applications of RFID
- Solve wireless network security issues
1. What is WEP Network Security?
Wireless networks are pervasive these days. It's hard to imagine going anywhere in North America that doesn't have one. In this lesson, we'll take a look at one of the related security technologies WEP, and how it relates to networks.
2. How to Secure a Wireless Network: Best Practices & Measures
Keeping your information safe starts with keeping a safe wireless network. In this lesson, we look at the best measures to keep WiFi networks secure, from simply encrypting data to restricting device access.
3. Wireless Transmission Characteristics: Components & Examples
In this lesson, we'll discuss the concepts of wireless transmission and its components. Topics will include the basics of antennas, frequency ranges, signal types and signal strengths.
4. Short-Range Wireless Communication: Bluetooth, ZigBee & Infrared Transmission
Short-range wireless communication uses signals that travel from a few centimeters to several meters. Learn about some of the most widely used types of short-range wireless technologies.
5. Medium-Range Wireless Communication: Wi-Fi & Hotspots
WiFi is the most widely used medium-range wireless communication technology. Learn how WiFi standards and access points are used to create hotspots for Internet access.
6. Wide Area Network Topologies
In this lesson, we'll examine the different types of network typologies and how they apply to a Wide Area Network. Their differences in data transmission will also be explored, along with their advantages and disadvantages.
7. What is Wireless Protected Access (WPA)?
Wi-Fi security has come a long way. Wireless Protected Access, or WPA, is currently what keeps our devices from being compromised. In this lesson, we'll look at what WPA is, its security features, and the differences between WPA Personal and WPA Enterprise.
8. WPA2 AES vs. TKIP
The old WEP standard has long been overtaken by WPA2 and its encryption standards. In this lesson, you'll learn about the differences between the AES and TKIP encryption standards and why AES is better than the older TKIP standard when setting up secure Wi-Fi networks.
9. Wi-Fi Encryption: Types, Security & Standards
In this lesson you'll learn about the different types of Wi-Fi encryption standards and which one works best when trying to secure your home or office Wi-Fi network.
10. WLAN Protocols: Types & Characteristics
In this lesson we will examine the different types of WLAN protocols. We will see how each protocol evolved in development over time from the first created standard. We will also understand their different characteristics and highlight their pros and cons.
11. What is RFID? - Definition & Applications
Did you know that you can find RFID chips everywhere from your hotel key card to the clothes tag at the department store? RFID has many uses from tracking inventory to tracking people. Learn how in this lesson.
12. Wireless Network Security Issues & Solutions
Anything being broadcasted, such as data over a wireless network, can potentially be intercepted. In this lesson, we'll examine security for wireless networks and how data can be protected from theft and malicious use.
Earning College Credit
Did you know… We have over 220 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.