{"id":4594,"date":"2021-12-24T12:06:52","date_gmt":"2021-12-24T17:06:52","guid":{"rendered":"https:\/\/iesmartsystems.com\/?p=4594"},"modified":"2021-12-29T12:07:11","modified_gmt":"2021-12-29T17:07:11","slug":"network-security-keys","status":"publish","type":"post","link":"https:\/\/iesmartsystems.com\/network-security-keys\/","title":{"rendered":"The Basics Of Network Security Keys"},"content":{"rendered":"

The Basics Of Network Security Keys<\/h1><\/div>
\"Network<\/span><\/div>
<\/div>

In an earlier blog, we compared your data network to a castle, and in that castle, there\u2019s a gatehouse (your router), and in that gatehouse, there\u2019s a guard making sure that only authorized traffic comes in and out (your firewall). Following that line of thinking, your network security key is the password that gives people access to your castle. <\/p>\n

To put it another way, \u201cnetwork security key\u201d is just the technical term for \u201cwifi password.\u201d Now, you may still be asking \u201cbut what is my wifi password?\u201d and if that\u2019s you, then you probably want to look on your router (there\u2019s usually a sticker that includes your preset network security key) or contact your internet service provider to help answer that question. <\/p>\n

If you\u2019re curious about the nature of network security keys, the role they play in keeping your network safe, and which types (WEP\/WPA\/WPA2) of keys are best, then this blog will help you.<\/p>\n<\/div>

Why Is A Network Security Key Important?<\/h2><\/div>

In the days before wireless networks, the only way to access a network was to connect physically onsite or to penetrate remotely (but still via hardwire, something firewalls were designed to prevent). Wireless routers allowed IT system administrators to provide network access to more people using less hardware. However, they also could allow for unauthorized access since it\u2019s impossible to broadcast the network signal exclusively to certain devices. It\u2019s projected over a wide area. The solution to this challenge was to require users to provide a passcode in the form of a Wired Equivalent Privacy (WEP) key \u2014 the first iteration of the network security key. Next came Wi-fi Protected Access keys, which are much stronger than WEP.<\/p>\n

Each type of key serves the same function as virtually every password \u2014 to allow easy access for authorized users and to make it difficult for malicious actors to gain access to the network and all the data within. <\/p>\n

If it falls into the wrong hands or if it\u2019s cracked via hacking software, your network security key allows hackers to compromise computers that are connected to the network and potentially other subsequent systems. <\/p>\n

The stronger your network security key, the safer your network, users, and data will be from spying eyes. Here\u2019s how the three most common types of keys rank in terms of security strength:<\/p>\n<\/div>

Weakest Security \u2014 WEP<\/h3><\/div>

Using a 10, 26, or 58 digit string of hexadecimals (numbers and letters exclusively) the WEP password offers fairly solid protection against someone who is simply trying to guess the correct string. Unfortunately, the WEP protocol can be cracked by algorithmic guessing software \u2014 a tool nearly every competent hacker will use.<\/p>\n

Now it\u2019s important to note that complexity is a vital principle when it comes to network security. You might deduce that a 58 character password sounds difficult, and certainly, it is exponentially more difficult than a 10 character password, but due to the absence of symbols and weaker encryption, it\u2019s still much easier for an algorithm to hack.<\/p>\n<\/div>

Moderate Security \u2014 WPA<\/h3><\/div>

Once the vulnerabilities of the WEP protocol became public knowledge, the WPA protocol replaced it. Although, you will style find WEP network security keys used on older equipment and networks. <\/p>\n

WPA offered much stronger protection from brute force attacks (where hackers use software to try all the possible password combinations as quickly as possible) it still contained serious flaws.<\/p>\n<\/div>

Strongest Security \u2014 WPA2<\/h3><\/div>

Fortunately, WPA was quickly replaced by WPA2, a protocol that was backward compatible. In fact, you\u2019ll almost always find the two labels appearing together as \u201cWPA\/WPA2\u201d. The default on new equipment is almost always WPA2.<\/p>\n

WPA2-compatible passwords are protected by the Advanced Encryption Standard (AES, also used on US-government classified data).<\/p>\n<\/div>

Strong Encryption Doesn\u2019t Protect You From Negligence<\/h2><\/div>

Thankfully WPA2 is a robust protocol for network security keys that offers excellent resistance to hacking. That protection doesn\u2019t mean much if you fail to take certain precautions with your wifi passwords. Writing them down or sharing them in any written form such as text or email leaves your network vulnerable. Choosing short or simple passwords is also a bad practice. <\/p>\n

Hackers are opportunistic and will use one password to unlock other systems and reveal still more passwords. <\/p>\n

If your business operates using wifi, you should consider broadcasting multiple networks: a private one for employees and a public one for everyone else. This reduces the likelihood of people sharing the network security key with the wrong people and it keeps the two types of traffic separate. <\/p>\n

The rabbit hole of wifi security is a deep one, so the best-case scenario is for you to adopt a security practice that your employees will comply with for the long term.<\/p>\n<\/div><\/div><\/div><\/div><\/div>

About i.e.Smart Systems<\/h4><\/div>

i.e.Smart Systems is a Houston, TX based technology integration partner that specializes in design and installation of audio\/visual technology and structured cabling. For more than three decades, our team of in-house experts has partnered with business owners, architectural firms, general contractors, construction managers, real estate developers, and designers in the Houston market, to deliver reliable, scalable solutions that align with their unique goals.<\/p>\n<\/div><\/div><\/div>

\"i.e.<\/span><\/div>
Contact Us<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"

Not all security keys are created equal. Depending on your network security protocol, you might be more exposed than you think. <\/p>\n","protected":false},"author":1,"featured_media":4597,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-4594","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest-articles"],"_links":{"self":[{"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/posts\/4594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/comments?post=4594"}],"version-history":[{"count":0,"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/posts\/4594\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/media\/4597"}],"wp:attachment":[{"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/media?parent=4594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/categories?post=4594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/tags?post=4594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}