WEBVTT

0
00:00.270 --> 00:02.360
Hi and welcome.

1
00:02.390 --> 00:03.110
now in this lecture.

2
00:03.110 --> 00:06.910
We're going to learn about different types of Wi-Fi protocols.

3
00:06.920 --> 00:09.890
There are three kinds of wireless security protocols out there.

4
00:09.890 --> 00:15.400
And those are WEP WPA and WPA2 .  Wi-Fi 

5
00:15.410 --> 00:21.260
Protocols are kind of logical to secure your Wi-Fi network but it is sometimes a bit puzzling to understand

6
00:21.350 --> 00:23.520
which encryption protocol to implement

7
00:23.570 --> 00:31.350
with all the acronyms. So now I will try to explain the difference among the encryption standard like WEP WPA

8
00:31.380 --> 00:38.840
etc. so you can understand which your work best Wi-Fi security algorithms have been through many

9
00:38.840 --> 00:45.380
changes and upgrade since the 1990s to become the more secure and effective different types of wireless

10
00:45.380 --> 00:51.100
security protocols were developed for homework wireless network protection. The wireless security protocol

11
00:51.100 --> 00:57.650
are WEP WPA and WPA2 serving the same purpose but being different at the same time.

12
00:57.650 --> 01:03.200
Not only do the protocols prevent unwanted parties from connecting to your wireless network but also

13
01:03.200 --> 01:07.380
wireless security protocols encrypt your private data sent over the airwaves.

14
01:07.820 --> 01:14.950
No matter how protected an encrypted wireless security cannot keep up in safety with wired network. The later

15
01:15.050 --> 01:21.500
at their most basic level transmit data between two points A and B connected by a network cable.

16
01:21.680 --> 01:28.580
To send data from A to B wireless network broadcasts it within their range in every direction to every

17
01:28.580 --> 01:31.250
connected device that happened to be listening.

18
01:31.250 --> 01:41.090
Okay let's have a closer look at WEP WPA and WPA2.
wired equivalent privacy or WEP was developed for wireless

19
01:41.090 --> 01:49.160
networks and approved as a Wi-Fi secured standard in September 1999 WEP was aim to offer

20
01:49.160 --> 01:51.950
the same security level as a wired network do.

21
01:51.980 --> 01:58.340
However there are a bunch of well-known security issues in WEP which is also easy to break and hard

22
01:58.340 --> 01:59.320
to configure.

23
01:59.480 --> 02:06.140
Despite all the work that has been done to improve the WEP system that is still is a highly venerable

24
02:06.140 --> 02:07.870
solution. Systems

25
02:08.040 --> 02:13.910
that's really on these protocols should be either upgraded or replaced in case securely upgraded is

26
02:13.910 --> 02:15.120
not possible.

27
02:15.200 --> 02:24.500
WEP was officially abandoned by Wi-Fi Alliance in 2004 Wi-Fi protected access or WPA for the time

28
02:24.500 --> 02:29.270
the 802.11i wireless security standard was in development.

29
02:29.350 --> 02:36.680
WPA was used as a temporary security enhancement for WEP. One year before WEP was officially abandoned

30
02:36.770 --> 02:39.480
and WPA was formally adopted.

31
02:39.480 --> 02:48.650
Most modern WPA application use a Pre shared key or PSK most often referred to as WPA personal and the temporal

32
02:48.650 --> 02:56.690
key integrated protocol or TKIP for encryption. WPA enterprise use an authentication server for case

33
02:56.720 --> 03:04.070
and certificates generation WPA was a significant enforcement over WEP but as the core competence were

34
03:04.070 --> 03:11.240
made so they could be rolled out through firmware upgrades on WEP Enable devices they steal relayed on to exploited 

35
03:11.240 --> 03:18.560
element WPA just like WEP after being put through proof of concept and applied public demonstration

36
03:18.650 --> 03:24.590
turned out to be pretty vulnerable intrusion the attacks that post the most treated  to the protocol

37
03:24.590 --> 03:31.490
ware however not the direct ones but those that are made on Wi-Fi  protected set-up or WPS.

38
03:32.140 --> 03:37.820
Auxiliary system developed to simplify the linking of the device to Modern access point. Now

39
03:37.880 --> 03:44.890
Wi-Fi protected access version 2 or WPA2. The 802.11i wireless security standard

40
03:44.890 --> 03:48.440
based protocol was introduced in 2004.  

41
03:48.440 --> 03:54.470
The most important improvement of WPA2 over WPA was use of the advanced encryption standard 

42
03:54.530 --> 04:02.030
or AES for encryption AES is approved by the US government for encrypting the information classified

43
04:02.150 --> 04:08.810
as top secret. So it must be good enough to protect home network. At this time the main vulnerability

44
04:08.840 --> 04:15.320
to a WPA2 system is when the attacker already has access to a secure Wi-Fi network and can

45
04:15.320 --> 04:20.540
gain access to certain key to perform an attack on the other devices on the network.

46
04:20.540 --> 04:26.900
This being said the security suggestion for the known WPA2 vulnerability  are mostly significant 

47
04:26.900 --> 04:32.440
to their networks of enterprise level and not really relevant for small home networks.

48
04:32.450 --> 04:39.110
Unfortunately the possibility of the attacks via the Wi-Fi  Protected setup WPS is still high the

49
04:39.140 --> 04:46.860
current WPA2 capable access point which is the issue with WPA also and even to breaking into a WPA

50
04:46.900 --> 04:53.810
WPA2 secured network through these whole will take anywhere around 2 hours to 14 hours. 

51
04:54.110 --> 05:00.140
And it is still a real security issue and WPA should be visible and it would be good if the access

52
05:00.140 --> 05:07.280
point firmware could be reset to distribution not supporting WPS to entirely execute this attack

53
05:07.280 --> 05:08.270
Vector.

54
05:08.270 --> 05:15.080
Now theWi-Fi protected setup or WPS. Wi-Fi protected setup is a network security slandered to create

55
05:15.080 --> 05:18.410
a secure wireless home network.

56
05:18.460 --> 05:24.670
The goal of the protocol is to allow home users who know little of wireless security and may be intimidated

57
05:24.700 --> 05:30.460
by the available security options to setup Wi-Fi protected access. As well as making it is easy

58
05:30.460 --> 05:36.400
to add a new device to existing network without entreating a long past presses. A major security flaw

59
05:36.400 --> 05:43.270
was relived in December 2011 that effects wireless routers with the WPS pin features which most recent

60
05:43.270 --> 05:45.370
models have been enable by default.

61
05:45.430 --> 05:51.610
The flaw allows a remote attacker to recover the WPS pin in a few hours with a brute-force attack.

62
05:51.620 --> 05:58.930
The users have been urged to turn off the WPS pin features although this not be possible on some router models.

63
05:58.930 --> 06:00.350
So what do you think.

64
06:00.430 --> 06:02.790
What is the best protocol forWi-Fi  security.

65
06:02.800 --> 06:06.280
I hope you understand which protocol work best for Wi-Fi security.

66
06:06.430 --> 06:07.820
That's all for this lecture.

67
06:07.870 --> 06:09.100
So seeing the next one. Bye.