The insecurity with keys is that they are more often than not shared
across all stations and access points in the network, so that key distribution
is a major problem. Note that when you take the same key and
share it with a number of users, ultimately that key will not stay secret.
Key insecurity is addressed by configuring the wireless stations with
the secret key, as opposed to allowing the users to execute this procedure.
This is still not the best answer, because the shared key is stored
on the user’s computer where a hacker can potentially retrieve it and
use that key to access the network fraudulently. If this happens, then
all the keys saved on every other wireless user’s computer must be reset
with an entirely new key.
The best way to defend against insecure keys is to migrate to a system
setting that assigns a unique key for each user’s computer; you
should still change the keys frequently, because you never know when
that key can become compromised and lead to an open avenue of opportunity
for a hacker to gain access to your wireless network.
206 times read
Did you enjoy this article?
(total 0 votes)