Protocol Comparison

Wireless networks are inherently insecure. There are 3 different encryption protocols – WEP , WPA, and WPA2 – that can be used to protect the wireless network.

Research WEP, WPA, and WPA2 encryption protocols.

Create a 1- to 2-page chart comparison of the 3 protocols. Include the following elements in your chart for each:

Encryption Technologies used
Strengths
Weaknesses, including some of the vulnerabilities associated with each of the protocols