WEP used secret keys to encrypt data moving between the AP and receiving stations.
Even a low-tech attacker can harm a business by launching packet floods against its access points (APs) and nearby server.Īt the start of the millennium, the Wired Equivalent Privacy (WEP) security protocol provided security for wireless enterprises by encrypting data so that it was protected during transmission between endpoints. Intruders can steal bandwidth to transmit spam or use a network as a springboard to attack others.
Passive eavesdroppers can gather proprietary information, logins, and passwords. Today's IT teams spend countless hours keeping wireless enterprise networks safe from the perils that permeate the radio waves.