Windows Supported wireless encryption types
Introduction
We all want to keep our wireless network secure, to keep our personal data and information safe, don’t we? Fortunately, Windows supports multiple wireless encryption types. You, as the user, have an option to choose between the best. However, you first need to understand the difference between the popular options, and which one makes a good option for your unique needs.
To help our readers, we have listed all the available options and what makes them different from each other.
Wireless security protocol
You need a wireless security protocol to secure your home or office wireless network. For the last couple of decades, wireless security protocols are also evolving and changing along with the wireless technology around us.
For example, Windows has now shifted from WEP connections to WPA security protocols, as WEP connections are no longer supported. If you are using the most secure and compatible security protocol for your home network, the risk of someone illegally accessing your Wi-Fi network is very small.
WEP
WEP, also known as Wired Equivalent Privacy, was ratified in 1999 as a Wi-Fi security standard and was one of the first and widely used wireless security protocols. In 2003 the Wi-Fi Alliance announced that Wi-Fi Protected Access (WPA) would supersede WEP in 2004. Ratification is ongoing.
Since the Windows 10 1903 release, a warning pops up when a user tries to connect to a WEP or TKIP network, encouraging them to seek a secure connection. According to Microsoft, “In a future release, any connection to a Wi-Fi network using these old ciphers will be disallowed.”
The common wireless security protocols for Windows users
WPA
WPA, also known as Wi-Fi Protected Access, was the first official replacement of WEP. Wi-Fi Alliance officially adopted the new security protocol in 2003, (Read more...)
*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Marcel Deniau. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/3BcGg5TGSyM/