answersLogoWhite

0


Best Answer

By using a Virtual Private Network (VPN) you will have a higher level of security than if you were to rely solely upon the wireless encryption. This will prevent other peers, that have access to the network, from being able to monitor your traffic in the clear. This will ensure your data is secret as far as you and the remote VPN server rather than just between you and the wireless access point.

It is also important to note that there are varying levels of security with WPA2. When operating in pre-shared key mode (PSK) your traffic can be monitored in the clear by anyone with the key, which includes other users of that network. However in some implementations of WPA2 in enterprise modes, you will be able to ensure that other peers on the network will not be able to monitor your traffic in the clear over the air.

It is important to note that unless you are using a connection that is encrypted end-to-end that there will be a point where your traffic can be monitored in the clear. Even connections through WPA2-Enterprise and VPN networks traffic can be monitored at a point where the data is sent unencrypted if such a point exists.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: The encryption methods used by what are stronger than WEP or WPA and are the preferred method when transmitting sensitive data over a wireless connection?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What advantage does a VPN have over WPA encryption when a notebook computer is using a wireless connection to connect to the internet and on to a private corporate network?

VPN encryption applies from the user's PC all the way to the host computer regardless of the type of network used. The encryption methods used by VPN are stronger than WEP and WPA and are the preferred method when transmitting sensitive data ocer a wireless connection.


What exactly is SSL encryption?

SSL encryption is a system that protects data. As the name implies in encrypts the data that is transferred between systems. It also checks to see whether the site is safe and will only proceed if it is happy that the site is certified and safe. These are additional checks that make sure the transfer of important and sensitive data are performed securely.


What is delay sensitive and bandwidth sensitive operations?

delay sensitive is a time delay parameter which is oftenly used in multimedia applications. The units of this parameter is sec. It usually ranges from 100 msec to 5 sec.


Advantages of DES?

protect for sensitive information.


What is a 64 bit encryption?

Answer: Data encryption is the process of scrambling stored or transmitted information so that it is unintelligible until it is unscrambled by the intended recipient. Historically, data encryption has been used primarily to protect diplomatic and military secrets from foreign governments. It is also now used increasingly by the financial industry to protect money transfers, by merchants to protect credit-card information in electronic commerce, and by corporations to secure sensitive communications of proprietary information. Encryption systems are often grouped into families. Common families include symmetric systems (e.g. AES) and asymmetric systems (e.g. RSA), or may be grouped according to the central algorithm used (e.g. elliptic curve cryptography). As each of these is of a different level of cryptographic complexity, it is usual to have different key sizes for the same level of security, depending upon the algorithm used. For example, the security available with a 1024-bit key using asymmetric RSA is considered approximately equal in security to an 80-bit key in a symmetric algorithm (Source: RSA Security). The actual degree of security achieved over time varies, as more computational power and more powerful mathematical analytic methods become available. For this reason cryptologists tend to look at indicators that an algorithm or key length shows signs of potential vulnerability, to move to longer key sizes or more difficult algorithms. For example as of May 2007, a 1039 bit integer was factored, with the special number field sieve using 400 computers over 11 months. The factored number was of a special form; the special number field sieve cannot be used on RSA keys. The computation is roughly equivalent to breaking a 700 bit RSA key. However, this might be an advanced warning that 1024 bit RSA used in secure online commerce should be deprecated, since they may become breakable in the near future. Cryptography professor Arjen Lenstra observed that "Last time, it took nine years for us to generalize from a special to a non-special, hard-to-factor number" and when asked whether 1024-bit RSA keys are dead, said: "The answer to that question is an unqualified yes 64 bit encryption indicates that the size of the key used to encrypt the messageis 64 bits. The 64-bit encryption standard was used in some early Internet and wireless communication encryption algorithms such as DES and WEP. Unfortunately, 64-bit encryption has proven too easy to decipher or crack in practice. Now, 128-bit encryption (in 3DES or TDES) have replaced the 64-bit encryption keys (DES).

Related questions

What advantage does a VPN have over WPA encryption when a notebook computer is using a wireless connection to connect to the internet and on to a private corporate network?

VPN encryption applies from the user's PC all the way to the host computer regardless of the type of network used. The encryption methods used by VPN are stronger than WEP and WPA and are the preferred method when transmitting sensitive data ocer a wireless connection.


All sensitive media on a laptop should be encrypted?

Only you can decide what on your computer needs to be protected by encryption.


What methods can be used to protect sensitive data from prying eyes?

Security controls (which include physical controls) Encryption


Why do you use encryption?

Encryption is used so that specific people, who have the key to the encryption, can read a given message, but other people who don't have the key can't read it. Sensitive information can thereby be sent to specific people while being concealed from the general public who might misuse it.


The process of disguising a message or data in what appears to be meaningless data to hide and protect the sensitive data from unauthorized access?

Encryption


Business or services that use encryption?

Many businesses and services use encryption, especially to protect customer data, private communications, and sensitive documents. Three good examples would be communications, financial services and the military.


Which type of conferencing is preferred for high level security sensitive negotiations?

Face- to- face


What are security products required in networking?

Sensitive information that is transmitted between two wireless devices can be intercepted and disclosed if not protected by strong encryption. Handheld devices, which are easily stolen, can reveal sensitive information.


Is email encryption necessary if you am not sharing sensitive information?

It isn't technically, necessary but it is a good idea if you have sensitive information stored in your email account. If someone really wants to access your email account, they can find a way. Encrypting your emails prevents this from happening.


Where gold used for aircraft?

Gold is the best conductor on this planet, it has zero voltage drop. it is preferred in highly sensitive circuits.


How is a stimulus transmitted across a synapse?

Neurons are responsible for transmitting a stimulus across a synapse. The electric potential of the neuron is sensitive to changes in the resting state and sets off electric transmissions.


Which file system supports encryption?

data encryption the process of scrambling stored or transmitted information so that it is unintelligible until it is unscrambled by the intended recipient. Historically, data encryption has been used primarily to protect diplomatic and military secrets from foreign governments. It is also now used increasingly by the financial industry to protect money transfers, by merchants to protect credit-card information in electronic commerce, and by corporations to secure sensitive communications of proprietary information.