Thursday, October 24, 2019

Word of the Day: WPA3

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | October 24, 2019
WPA3

WPA3, also known as Wi-Fi Protected Access 3, is the third iteration of a security certification program developed by the Wi-Fi Alliance. WPA3 is the latest, updated implementation of WPA2, which has been in use since 2004.

The Wi-Fi Alliance began to certify WPA3-approved products in 2018. WPA3 support will not be automatically added to every device, but WPA3 devices will be backwards-compatible with devices that use the WPA2 protocol. While WPA3 is more secure and comprehensive than WPA2, the the Wi-Fi Alliance will still support and update the WPA2 protocol for the foreseeable future.

 

WPA3 vs WPA2

When compared to the WPA2 standard, WPA3 adds the following notable features:

  • Individualized data encryption.
  • Bigger session keys.
  • Stronger brute force attack protection.
  • Simultaneous Authentication of Equals (SAE) support.
  • Device Provisioning Protocol (DPP) support.

Quote of the Day

 
"With the exception of the WPA3 standard -- which is still growing in adoption after the Wi-Fi Alliance introduced it in 2018 -- WPA2 is the most prevalent and up-to-date wireless encryption protocol, making it the most secure choice."" - Alissa Irei

Learning Center

 

How does 802.11ax security benefit from WPA3?
Security methods like WPA3 and Opportunistic Wireless Encryption will give a boost to 802.11ax security, but securing the new wireless standard is still pretty complicated.

Defending against the most common wireless network attacks
Most common wireless network attacks depend on the same wireless network vulnerabilities that have been exploited for years. Find out how attackers use your wireless networks against you and how to defend against these attacks.

11 common wireless security risks you don't have to take
Wi-Fi is a boon to productivity, but it can also create serious security issues. Learn how any company can uncover and fortify their wireless security setup.

10 steps to troubleshoot enterprise wireless connection problems
Wireless connection problems can crop up when joining a wireless client to an office network. Follow these 10 network troubleshooting steps when untangling wireless connection issues.

What are the dangers of mobile hotspot tethering?
Mobile hotspot tethering is an easy way for users to access the internet when they're outside the office or on the road, but it presents some security challenges for IT.

Quiz Yourself

 

CISSP quiz: Cryptography CISSP certification practice test

Test your knowledge of the CISSP exam's Cryptography Domain by taking this practice quiz, which covers topics including public and private keys, encryption algorithms, digital certificates and more.

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact us at: editor@whatIs.com

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: