Encryption is to trasform the data into the coded form..like password or securty key n if u want to read dat then u must hv to access on dat coded key..
You need to choose stronger encryption and longer encryption key.
Using encryption is the best answer because it requires a security key.
wpa2
Upgrade to the LEAP wireless security protocol.
Corporate and government networks are typically protected by many layers of security, ranging from network firewalls to encryption. In addition, they usually have support staff who maintain the security and availability of these network connections.
Peer to peer network
Upgrade to the LEAP wireless security protocol.
You have to use the same security settings for your wireless adapter that the network you are attempting to join is using. You need to configure the encryption type (WEP, WPA, WPA2, etc.), and the key in order to join the network. If you do not have this information, contact the network administrator. If this is a home network, contact the person who set it up.
If your computer only supports WEP encryption, but the wireless network uses WPA, you will not be able to connect to the network. However, most wireless networks can be configured to use WEP security or no security, which will allow you to connect. The trade-off is that the network becomes less secure. WEP encryption is possible to defeat, and turning off security will allow anyone connected to the network to view all data traffic, including private information. A better option may be to purchase a wireless adapter that supports WPA encryption. WPA was developed to fix the flaws of WEP, and is much stronger.
. Does AMA ethics opinion mention encryption as a technique for security?
There is a lot of security encryption software about. It can be for your hard drive or just for your emails. The most popular cyphers are PGP, Blowfish and AES encryption.
The network security tools that you should have in place include firewalls, proxy servers, encryption, logical security and access controls, anti-virus software and log management tools. It is also vital to make sure that everything has been updated to the most current versions available ensure network security.