Wireless networks are inherently insecure. There are 3 different encryption protocols – WEP , WPA, and WPA2 – that can be used to protect the wireless network.
Research WEP, WPA, and WPA2 encryption protocols.
Create a 1- to 2-page chart comparison of the 3 protocols. Include the following elements in your chart for each:
Encryption Technologies used
Strengths
Weaknesses, including some of the vulnerabilities associated with each of the protocols