Computer Science – 2.1 Networks including the internet | e-Consult
2.1 Networks including the internet (1 questions)
A Wireless Access Point (WAP) acts as a bridge between a wired network and wireless devices. It receives data from a wired network (typically via an Ethernet cable) and transmits it wirelessly using radio waves. Devices with Wi-Fi capabilities can then connect to the WAP, effectively joining the wired network without a physical cable connection. The WAP uses radio frequencies to transmit and receive data, creating a wireless network that devices can connect to.
Security Considerations with WAPs:
Wireless networks are inherently more vulnerable to security threats than wired networks. Data transmitted wirelessly can be intercepted if not properly secured. Therefore, robust security measures are crucial.
Security Protocols:
Several security protocols are used to protect wireless networks:
- WEP (Wired Equivalent Privacy): The oldest and least secure protocol. It is easily cracked and should not be used. Weakness: Susceptible to various attacks.
- WPA (Wi-Fi Protected Access): An improvement over WEP, offering stronger encryption. Weakness: Vulnerable to dictionary attacks if the password is weak.
- WPA2 (Wi-Fi Protected Access 2): A more secure protocol than WPA, offering stronger encryption and protection against attacks. Strength: Strong encryption and robust security features. Currently considered the standard.
- WPA3 (Wi-Fi Protected Access 3): The latest and most secure protocol. It offers improved encryption, protection against brute-force attacks, and enhanced security for IoT devices. Strength: Enhanced security features, including individual device authentication.
It's important to use WPA2 or WPA3 encryption and a strong, unique password to protect a wireless network. Regularly updating the WAP's firmware is also crucial to address security vulnerabilities. Using MAC address filtering can provide an additional layer of security, but it can be easily bypassed.