课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Wireless authentication

Wireless authentication

- [Instructor] While some wireless networks are meant for open access by anyone who wishes to use them, most wireless networks limit access to authorized users. There are three primary mechanisms to authenticate the users of a wireless network. Pre-shared keys, enterprise authentication, and captive portals. Pre-shared keys are the simplest kind of wireless authentication, and they're commonly used on home wifi networks. In the pre-shared key approach, the network uses an encryption key to control access. Whenever a user wishes to connect a device to the network, they must enter that pre-shared key on the device. The pre-shared key may be entered directly as a 64 character hexadecimal string, but that's a very unwieldy approach. Instead, most networks that use pre-shared keys ask users to enter a password consisting of between eight and 13 ASCII characters. The network then uses the PBKDF2 key stretching function to convert that ASCII password into a longer and stronger network…

内容