Save
Computer Science (Personal)
1.3 Computer Networks Connections and Protocols
Encryption
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Eoin H
Visit profile
Cards (9)
Private key
A master key that is
never shared
View source
Public key
A key that can be
shared
View source
Purpose of
encryption
To scramble data into
cipher
text to make it
secure
View source
Service Set Identifier (SSID)
A
unique
identifier for a
wireless
network
View source
Protecting wireless networks
1.
SSID
can be set manually or
hidden
2.
SSID
can be protected with a
password
View source
Encryption
Scrambling data into cipher text using a master
key
created from the
SSID
and password
View source
Wireless networks broadcast data
Data must be
encrypted
to be
secure
View source
Wireless encryption
1.
Handshaking
protocol used to ensure receiver has valid
master
key before transmission begins
2. Protocols used include WEP,
WPA
,
WPA2
View source
Although
wired
networks are naturally more secure,
encryption
is still available and often a sensible precaution
View source