Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 418
  • Last Modified:

Different types of wireless secutiry

Can someone please tell me the difference between these, and what is best (any why)?

WPA-PSK (TKIP)
WPA2-PSK (AES)
WPA-PSK (TKIP) + WPA2-PSK (AES)

0
qwertq
Asked:
qwertq
  • 2
1 Solution
 
mattyfonzCommented:
what environment are you using it for? home or in an office or corporate network?
if at home id use wpa2-psk (AES) as it is the strongest form of security among those you have listed

According to http://forum.bsr-clan.de/ftopic1715.html
There are three (3) available encryption types to use with WPA. The first one is TKIP and currently the most common. The second one is AES, and currently the strongest type of encryption offered for non RADIUS wireless networks.  third is TKIP+AES which is a merge of both encryption types, but slightly weaker then AES alone. "AES" is the recommended setting if all wireless clients support it.

i agree with the poster.
0
 
qwertqAuthor Commented:
its just home.
i was using just mac filtering and hidden network. but that just is not secure.

i will change to your reccomendation.

also, on my macbook. when i connect to a network it has these as security options:

WEP Password
WEP 40/128-bit Hex
WEP 40/128-bit ASCII
LEAP
WPA Personal
WPA Enterprise
WPA2 Personal
WPA2 Enterprise
802.1x WEP

Do i select WPA2 Personal?  
0
 
mattyfonzCommented:
yes WPA2 Personal is WPA2 AES
you can leave the other security you have set in place as it offers multiple layers of security
eg: a hacker would have to:
discover your hidden SSID
spoof your MAC
crack WPA2 to get onto your network
granted the first 2 arent very difficult but it acts as a deterrent to the casual snooper as opposed to a determined hacker :)
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now