All language subtitles for 4. Wireless Security Protocols

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese Download
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,420 --> 00:00:05,040 In the section we will talk about wireless security protocols 2 00:00:07,640 --> 00:00:10,670 wireless security is extremely important. 3 00:00:10,670 --> 00:00:20,570 Guys the West majority of us connect a mobile device to Iraq or at some point during each day can be 4 00:00:20,660 --> 00:00:22,150 a smartphone. 5 00:00:22,150 --> 00:00:26,660 You know everyone has tablets laptops or otherwise. 6 00:00:27,110 --> 00:00:33,920 Furthermore Internet of Things devices connect to Internet using Wi-Fi anymore. 7 00:00:34,070 --> 00:00:42,290 They are always on and always listening and always in dire need of additional security. 8 00:00:42,320 --> 00:00:46,380 That is where Wi-Fi encryption steps in. 9 00:00:46,400 --> 00:00:51,100 There are several different ways to protect our Wi-Fi connection. 10 00:00:51,110 --> 00:00:56,630 But how do you know which Wi-Fi security stand that is the best. 11 00:00:56,630 --> 00:01:03,680 So here is how let's start with the WPA. 12 00:01:03,900 --> 00:01:14,670 The most common Wi-Fi securities types are WPA wpa 2 and WPA 3 which is quite new for the time. 13 00:01:14,670 --> 00:01:24,870 The 800 to that eleven I wireless security standard was in development WPA was used as a temporary security 14 00:01:24,900 --> 00:01:35,480 enhancement for vet one year before vet was officially abandoned WPA was formally adopted most modern 15 00:01:35,480 --> 00:01:39,640 WPA applications use appreciate key. 16 00:01:39,800 --> 00:01:50,630 Most often referred to as WPA personnel and the temporal K integrity protocol or T.K. IP for encryption 17 00:01:51,470 --> 00:01:57,800 WPA enterprise uses and authentication server for keys and certificates. 18 00:01:57,800 --> 00:02:08,360 Generation WPA was a significant enhancement over over rap but as the core components were made so they 19 00:02:08,360 --> 00:02:16,850 could be rolled out through firmware upgrades on web enabled devices they still relied on to exploit 20 00:02:16,950 --> 00:02:21,410 the elements WPA just like rap. 21 00:02:21,470 --> 00:02:29,600 After being put through proof of concept and applied public dance demonstrations turned out to be pretty 22 00:02:29,600 --> 00:02:32,240 vulnerable to intrusions. 23 00:02:32,240 --> 00:02:41,390 The attacks that pose the most threat to the protocol were however not the direct ones but those that 24 00:02:41,450 --> 00:02:46,120 were made on Wi-Fi protected setup auxiliary system. 25 00:02:46,130 --> 00:02:52,380 There will opt to simplify the linking of devices to more than access points. 26 00:02:55,050 --> 00:03:00,560 Let's go ahead with the WPA dash to the 800 to that. 27 00:03:00,850 --> 00:03:09,960 Eleven I viral securities tender based protocol was introduced in 2000 and four guys and the most important 28 00:03:09,990 --> 00:03:18,000 improvement of WPA to over WPA was the usage of advanced anchor options. 29 00:03:18,000 --> 00:03:28,140 Then there to a E S A S is approved by U.S. government to encrypting the information classified as top 30 00:03:28,140 --> 00:03:34,800 secret so it must be good enough to protect home networks at this time. 31 00:03:34,800 --> 00:03:43,890 The main vulnerability to WPA to system is when attacker already has access to a secured Wi-Fi network 32 00:03:44,250 --> 00:03:53,670 and can gang and can gain access to certain keys to perform an attack on other devices on the network. 33 00:03:53,670 --> 00:04:02,280 This being said the security suggestions for the known WPA two vulnerabilities are mostly significant 34 00:04:02,310 --> 00:04:11,610 to the networks of enterprise levels and not really relevant for small home networks unfortunately the 35 00:04:11,610 --> 00:04:21,960 possibility of attacks via the Wi-Fi protected set up WP as is still high in the current WPA to keep 36 00:04:21,960 --> 00:04:26,060 people access points which is the issue with WPA. 37 00:04:26,070 --> 00:04:36,000 As I explained to you and even even though breaking into a WPA WPA to secure networks through this hole 38 00:04:36,480 --> 00:04:47,940 will take anywhere from two to 14 hours it is still really a security issue on and a WPA should be disabled 39 00:04:48,030 --> 00:04:56,250 and it will be good for you if the access point for me could be reset to a distribution not supporting 40 00:04:56,250 --> 00:05:00,220 Derby appears to entirely exclude this attack. 41 00:05:00,220 --> 00:05:00,720 Rector 42 00:05:03,490 --> 00:05:12,430 Thirdly we will take a look at the WPA 3 now protecting Wi-Fi from hackers is one of the most important 43 00:05:12,430 --> 00:05:21,400 tasks in cyber security guys and which is why the arrival of next generation wireless security protocol 44 00:05:21,430 --> 00:05:34,420 WPA 3 deserves our attention so and not only is it going to keep Wi-Fi connections safer but also it 45 00:05:34,420 --> 00:05:39,550 will help save you from your own security shortcomings. 46 00:05:39,550 --> 00:05:41,300 Here is what it offers. 47 00:05:41,320 --> 00:05:42,870 Actually guys. 48 00:05:43,150 --> 00:05:48,090 Most importantly it's offering a password protection. 49 00:05:48,610 --> 00:05:54,860 Let's start with how WPA 3 will protect you at home. 50 00:05:54,880 --> 00:06:03,640 Specifically it will mitigate the damage that might stem from your lazy password skies a fundamental 51 00:06:03,640 --> 00:06:14,140 weakness of WPA to the current wireless security protocol that makes to 2004 is that it lets hackers 52 00:06:14,200 --> 00:06:20,970 deploy a so-called off line dictionary attack to guess your your password. 53 00:06:21,490 --> 00:06:30,550 An attacker can take as many shots as they want to and guessing your credentials without being on the 54 00:06:30,550 --> 00:06:31,620 same network. 55 00:06:31,630 --> 00:06:38,020 Cycling through the entire dictionary and beyond in relatively short order. 56 00:06:38,800 --> 00:06:44,100 The other benefit comes in the event that your password gets compromised. 57 00:06:44,100 --> 00:06:53,110 Now tell us what this new handshake WPA three supports forward secrecy meaning that any traffic that 58 00:06:53,200 --> 00:07:02,530 came across your transom before an outsider gained access will remain encrypted and with WPA to they 59 00:07:02,530 --> 00:07:06,080 can decrypt the old traffic as well. 60 00:07:06,580 --> 00:07:17,860 And also WPA 3 provide safer connections skies when wpa 2 came along in 2000 and for the Internet of 61 00:07:17,860 --> 00:07:26,680 Things had not been yet become anything close to the all consuming security horror that it is present 62 00:07:26,680 --> 00:07:28,150 day homework. 63 00:07:28,210 --> 00:07:37,960 No wonder then the WPA offered no streamlined way to safely onboard these devices to an existing Wi-Fi 64 00:07:37,960 --> 00:07:47,770 network and in fact the predominant method by which that process happens today Wi-Fi protected set up 65 00:07:48,070 --> 00:07:58,810 has had known vulnerabilities since 2000 and eleven and WPA 3 provides affects Wi-Fi easy connect as 66 00:07:58,810 --> 00:08:08,650 the Wi-Fi Alliance calls it makes it easier to get wireless devices that have no screen or input mechanism 67 00:08:08,680 --> 00:08:17,650 onto your network when enabled you will simply use your smartphone to scan a QR code on your rather 68 00:08:17,950 --> 00:08:27,760 than scan a QR code on your printer or speaker or other I or t device and you are sad and they are securely 69 00:08:27,760 --> 00:08:31,220 connected with the QR code code. 70 00:08:31,230 --> 00:08:32,000 Me too. 71 00:08:32,140 --> 00:08:40,840 You are using public key based encryption to onboard devices that currently largely lack a simple secure 72 00:08:40,840 --> 00:08:43,590 method to do so. 73 00:08:43,630 --> 00:08:52,600 That trend plays out also with Wi-Fi enhanced open which the Wi-Fi Alliance detailed a few weeks before. 8275

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.