Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,420 --> 00:00:05,040
In the section we will talk about wireless security protocols
2
00:00:07,640 --> 00:00:10,670
wireless security is extremely important.
3
00:00:10,670 --> 00:00:20,570
Guys the West majority of us connect a mobile device to Iraq or at some point during each day can be
4
00:00:20,660 --> 00:00:22,150
a smartphone.
5
00:00:22,150 --> 00:00:26,660
You know everyone has tablets laptops or otherwise.
6
00:00:27,110 --> 00:00:33,920
Furthermore Internet of Things devices connect to Internet using Wi-Fi anymore.
7
00:00:34,070 --> 00:00:42,290
They are always on and always listening and always in dire need of additional security.
8
00:00:42,320 --> 00:00:46,380
That is where Wi-Fi encryption steps in.
9
00:00:46,400 --> 00:00:51,100
There are several different ways to protect our Wi-Fi connection.
10
00:00:51,110 --> 00:00:56,630
But how do you know which Wi-Fi security stand that is the best.
11
00:00:56,630 --> 00:01:03,680
So here is how let's start with the WPA.
12
00:01:03,900 --> 00:01:14,670
The most common Wi-Fi securities types are WPA wpa 2 and WPA 3 which is quite new for the time.
13
00:01:14,670 --> 00:01:24,870
The 800 to that eleven I wireless security standard was in development WPA was used as a temporary security
14
00:01:24,900 --> 00:01:35,480
enhancement for vet one year before vet was officially abandoned WPA was formally adopted most modern
15
00:01:35,480 --> 00:01:39,640
WPA applications use appreciate key.
16
00:01:39,800 --> 00:01:50,630
Most often referred to as WPA personnel and the temporal K integrity protocol or T.K. IP for encryption
17
00:01:51,470 --> 00:01:57,800
WPA enterprise uses and authentication server for keys and certificates.
18
00:01:57,800 --> 00:02:08,360
Generation WPA was a significant enhancement over over rap but as the core components were made so they
19
00:02:08,360 --> 00:02:16,850
could be rolled out through firmware upgrades on web enabled devices they still relied on to exploit
20
00:02:16,950 --> 00:02:21,410
the elements WPA just like rap.
21
00:02:21,470 --> 00:02:29,600
After being put through proof of concept and applied public dance demonstrations turned out to be pretty
22
00:02:29,600 --> 00:02:32,240
vulnerable to intrusions.
23
00:02:32,240 --> 00:02:41,390
The attacks that pose the most threat to the protocol were however not the direct ones but those that
24
00:02:41,450 --> 00:02:46,120
were made on Wi-Fi protected setup auxiliary system.
25
00:02:46,130 --> 00:02:52,380
There will opt to simplify the linking of devices to more than access points.
26
00:02:55,050 --> 00:03:00,560
Let's go ahead with the WPA dash to the 800 to that.
27
00:03:00,850 --> 00:03:09,960
Eleven I viral securities tender based protocol was introduced in 2000 and four guys and the most important
28
00:03:09,990 --> 00:03:18,000
improvement of WPA to over WPA was the usage of advanced anchor options.
29
00:03:18,000 --> 00:03:28,140
Then there to a E S A S is approved by U.S. government to encrypting the information classified as top
30
00:03:28,140 --> 00:03:34,800
secret so it must be good enough to protect home networks at this time.
31
00:03:34,800 --> 00:03:43,890
The main vulnerability to WPA to system is when attacker already has access to a secured Wi-Fi network
32
00:03:44,250 --> 00:03:53,670
and can gang and can gain access to certain keys to perform an attack on other devices on the network.
33
00:03:53,670 --> 00:04:02,280
This being said the security suggestions for the known WPA two vulnerabilities are mostly significant
34
00:04:02,310 --> 00:04:11,610
to the networks of enterprise levels and not really relevant for small home networks unfortunately the
35
00:04:11,610 --> 00:04:21,960
possibility of attacks via the Wi-Fi protected set up WP as is still high in the current WPA to keep
36
00:04:21,960 --> 00:04:26,060
people access points which is the issue with WPA.
37
00:04:26,070 --> 00:04:36,000
As I explained to you and even even though breaking into a WPA WPA to secure networks through this hole
38
00:04:36,480 --> 00:04:47,940
will take anywhere from two to 14 hours it is still really a security issue on and a WPA should be disabled
39
00:04:48,030 --> 00:04:56,250
and it will be good for you if the access point for me could be reset to a distribution not supporting
40
00:04:56,250 --> 00:05:00,220
Derby appears to entirely exclude this attack.
41
00:05:00,220 --> 00:05:00,720
Rector
42
00:05:03,490 --> 00:05:12,430
Thirdly we will take a look at the WPA 3 now protecting Wi-Fi from hackers is one of the most important
43
00:05:12,430 --> 00:05:21,400
tasks in cyber security guys and which is why the arrival of next generation wireless security protocol
44
00:05:21,430 --> 00:05:34,420
WPA 3 deserves our attention so and not only is it going to keep Wi-Fi connections safer but also it
45
00:05:34,420 --> 00:05:39,550
will help save you from your own security shortcomings.
46
00:05:39,550 --> 00:05:41,300
Here is what it offers.
47
00:05:41,320 --> 00:05:42,870
Actually guys.
48
00:05:43,150 --> 00:05:48,090
Most importantly it's offering a password protection.
49
00:05:48,610 --> 00:05:54,860
Let's start with how WPA 3 will protect you at home.
50
00:05:54,880 --> 00:06:03,640
Specifically it will mitigate the damage that might stem from your lazy password skies a fundamental
51
00:06:03,640 --> 00:06:14,140
weakness of WPA to the current wireless security protocol that makes to 2004 is that it lets hackers
52
00:06:14,200 --> 00:06:20,970
deploy a so-called off line dictionary attack to guess your your password.
53
00:06:21,490 --> 00:06:30,550
An attacker can take as many shots as they want to and guessing your credentials without being on the
54
00:06:30,550 --> 00:06:31,620
same network.
55
00:06:31,630 --> 00:06:38,020
Cycling through the entire dictionary and beyond in relatively short order.
56
00:06:38,800 --> 00:06:44,100
The other benefit comes in the event that your password gets compromised.
57
00:06:44,100 --> 00:06:53,110
Now tell us what this new handshake WPA three supports forward secrecy meaning that any traffic that
58
00:06:53,200 --> 00:07:02,530
came across your transom before an outsider gained access will remain encrypted and with WPA to they
59
00:07:02,530 --> 00:07:06,080
can decrypt the old traffic as well.
60
00:07:06,580 --> 00:07:17,860
And also WPA 3 provide safer connections skies when wpa 2 came along in 2000 and for the Internet of
61
00:07:17,860 --> 00:07:26,680
Things had not been yet become anything close to the all consuming security horror that it is present
62
00:07:26,680 --> 00:07:28,150
day homework.
63
00:07:28,210 --> 00:07:37,960
No wonder then the WPA offered no streamlined way to safely onboard these devices to an existing Wi-Fi
64
00:07:37,960 --> 00:07:47,770
network and in fact the predominant method by which that process happens today Wi-Fi protected set up
65
00:07:48,070 --> 00:07:58,810
has had known vulnerabilities since 2000 and eleven and WPA 3 provides affects Wi-Fi easy connect as
66
00:07:58,810 --> 00:08:08,650
the Wi-Fi Alliance calls it makes it easier to get wireless devices that have no screen or input mechanism
67
00:08:08,680 --> 00:08:17,650
onto your network when enabled you will simply use your smartphone to scan a QR code on your rather
68
00:08:17,950 --> 00:08:27,760
than scan a QR code on your printer or speaker or other I or t device and you are sad and they are securely
69
00:08:27,760 --> 00:08:31,220
connected with the QR code code.
70
00:08:31,230 --> 00:08:32,000
Me too.
71
00:08:32,140 --> 00:08:40,840
You are using public key based encryption to onboard devices that currently largely lack a simple secure
72
00:08:40,840 --> 00:08:43,590
method to do so.
73
00:08:43,630 --> 00:08:52,600
That trend plays out also with Wi-Fi enhanced open which the Wi-Fi Alliance detailed a few weeks before.
8275
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.