answersLogoWhite

0

The main problem is somebody sniffing the network. At least when the traffic is encrypted the attacker now has to unencrypt it. Depending on your encryption this could take minutes or months.

How big of a risk does authenticating over an unencrypted line pose. Depends on what your authenticating to, if its only your YouTube account then you will probably dont have much to worry about, if your authenticating with your bank for perhaps a money transfer - then this could lead to problems.

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

What describes possible security issues related to instant messaging messages?

Many IM tools send unencrypted data across the P2P network.


What network port is normally associated with unencrypted web traffic?

Port 80


How important is a network security test in regards to a secure internet connection?

A network security test is all-important with regard to a secure internet connection. It prevents unauthorized access and prevents stealing of sensitive data.


Is the network security key is the wifi's password?

In general, yes. The WiFi password is a network security key. There are some special systems, however, which require a different network security key to access the internet, sometimes even if you have a wired connection.


Which type profile that vista assigns to a network connection offers the least security?

Domain profile


Which type of network traffic requires high reliability and security but can sustain a low bandwidth connection in a converged network?

"transactional traffic" is the righ answer.


Consider network security Could someone eavesdrop on your network connection?

Yes, especially if you don't encrypt your communications. Packet sniffer programs do this all the time.


What type of profile that Vista assigns to network connection offers the least security?

A Domain profile offers the least security. A Private profile offers moderate security and a Public profile offers the highest security.


How many kind of connection network?

there are two types of connection network: Point-to-Point Connection and Multipoint Connection


A network of 10 or fewer workstation connection by cable for the direct sharing file and hardware resources is which type pf network?

Peer to Peer network (Microsoft calls it a Workgroup). Does not require cable for connection, can be wireless. Is appropriate for up to 10 computers. Each computer in a Peer to Peer network keeps its own security access database. That means, each connection to the computer must have an account on that computer.


What does the Nintendo DSi error code 051099 mean?

This is a problem with the security settings on your wireless connection. To do what you were doing when the error code appeared, change your wireless network security type to WEP, or disable security (not recommended).


Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?

Some adapters require you to predefine settings for such networks including security network phrase, name of the network, type of connection type of security and so on.