In an Ethernet LAN, physical access to an active RJ-45 walljack or hub/switch port lets you see all traffic on...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
the LAN. Similarly, in an 802.11 wireless LAN, possession of the shared key used by WEP lets you see all traffic on the WLAN. Neither medium prevents other stations on the same LAN from seeing the traffic your station sends and receives. WEP uses encryption as a "replacement" for the physical access control inherent in wired LANs, since wireless LAN traffic can be received by any station in proximity to the transmitter. Recent augmentations to WEP, like the Temporal Key Integrity Protocol (TKIP) defined by IEEE 802.11i, do a better job of accomplishing this objective than the original 802.11:1999 WEP standard did.
Related Q&A from Lisa Phifer
The enterprise mobility management market for wearable devices is in its infancy, but IT can still use existing EMM tools to manage wearables.continue reading
Wireless expert Lisa A. Phifer explains to what extent WEP cracking remains a worrisome issue. It all depends on your company's WLAN security policy.continue reading
Wireless expert Lisa A. Phifer explains why you shouldn't stop using 802.1X authentication methods for enterprise WLAN access control.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.