Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Is a shared WEP key for Wireless Access Points any more Secure than Unsecured Wireless?

Posted on 2006-10-23
1
Medium Priority
?
267 Views
Last Modified: 2010-04-11
I understand that using a WEP key encrypts the data being sent over a network so that only the person with the key can connect to the network and use it.  But if the Key is public, say posted on signs inside and outside the building, then would that defeat the purpose of the security settings?

We have a WiFi network at work that is open to the general public.  (They are allowed, and even encouraged, to walk up and sit outside the building and browse the web.)

If it is possible to make it a little safer for the average Joe to use the wireless without having someone log their usage/usernames/passwords, then I'd like to, but from my understanding a hacker could just use the same WEP key everyone else has to decrypt the signal and view/record network traffic.
0
Comment
Question by:OneSeventeen
1 Comment
 
LVL 4

Accepted Solution

by:
StonewallJacoby earned 1000 total points
ID: 17792805
A wireless network with a known shared WEP key is the same thing as an unsecured wireless network, only slower.  Having the WEP key allows anyone to (unlawfully) capture and decrypt traffic, including the capture of logons being used by anyone.
0

Featured Post

[Webinar On Demand] Database Backup and Recovery

Does your company store data on premises, off site, in the cloud, or a combination of these? If you answered “yes”, you need a data backup recovery plan that fits each and every platform. Watch now as as Percona teaches us how to build agile data backup recovery plan.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like me and like multiple layers of protection, read on!
Spectre and Meltdown, how it affects me and my clients?
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question