?
Solved

Is a shared WEP key for Wireless Access Points any more Secure than Unsecured Wireless?

Posted on 2006-10-23
1
Medium Priority
?
263 Views
Last Modified: 2010-04-11
I understand that using a WEP key encrypts the data being sent over a network so that only the person with the key can connect to the network and use it.  But if the Key is public, say posted on signs inside and outside the building, then would that defeat the purpose of the security settings?

We have a WiFi network at work that is open to the general public.  (They are allowed, and even encouraged, to walk up and sit outside the building and browse the web.)

If it is possible to make it a little safer for the average Joe to use the wireless without having someone log their usage/usernames/passwords, then I'd like to, but from my understanding a hacker could just use the same WEP key everyone else has to decrypt the signal and view/record network traffic.
0
Comment
Question by:OneSeventeen
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 4

Accepted Solution

by:
StonewallJacoby earned 1000 total points
ID: 17792805
A wireless network with a known shared WEP key is the same thing as an unsecured wireless network, only slower.  Having the WEP key allows anyone to (unlawfully) capture and decrypt traffic, including the capture of logons being used by anyone.
0

Featured Post

Need protection from advanced malware attacks?

Look no further than WatchGuard's Total Security Suite, providing defense in depth against today's most headlining attacks like Petya 2.0 and WannaCry. Keep your organization out of the news with protection from known and unknown threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions? Just ask.
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question