Lihat ke Halaman Asli

The Example of Authentic Text

Diperbarui: 10 Mei 2023   10:52

Kompasiana adalah platform blog. Konten ini menjadi tanggung jawab bloger dan tidak mewakili pandangan redaksi Kompas.

Ilmu Alam dan Teknologi. Sumber ilustrasi: PEXELS/Anthony

Handling Security Problems on Wireless Network with WPA (Wi-Fi Protected Access) Encryption Technology at SMK Negeri 1 Klaten

By : Ramadhan Ryan, Muhammad Tri Naufal, Shafa Salsabila, Fatimah Kusuma

In today's digital era, wireless networks have become an essential requirement for most people. Wireless networks can provide wireless internet access, allowing users to connect to the internet without having to sit near a modem or router. Wireless networks have several characteristics, such as being able to handle mobile users, using media without cables, being easy to install and cheap in terms of cost when compared to wired networks, having security methods, being easy to use, supporting user mobility, and having the ability to change as needed. However, wireless networks also have several problems, one of these problems is security, which needs to be addressed.

It is important for users who need an easy and secure internet connection to know the solution that must be found. Therefore, researchers in this article want to provide information about how to overcome the security system on wireless using WPA encryption.

According to Priyambodo, wireless is a standard for wireless networks, or what is known as "wireless networking," with the function of allowing the components of the internet network to be connected or to connect to the internet easily and without hassle.

According to the article ISU TECHNOLOGY STT MANDALA VOL.7 NO.2 2014, there are several problems with wireless security systems, namely:

Eavesdropping on communication lines (man-in-the-middle attack) can be done more easily because there is no need to find a cable line to make a connection. Systems that do not use encryption and authentication security or use encryption that is easily broken (cryptanalysis) will be easily captured.

According to Professor William Stallings, a network security expert, using strong encryption protocols such as WPA2 or WPA3 to secure wireless networks To solve security problems on wireless networks, users can use WPA (Wi-Fi Protected Access) encryption technology. This technology will encrypt data transmitted over a wireless network so that it cannot be accessed by unauthorized parties. In addition, users can also set the router to only accept connections from authorized devices.

The writers have provided information on how to overcome security problems on wireless networks using WPA encryption technology, specifically WPA/WPA2 with Pre-Shared Key. They have also explained what WPA is, its purpose, and how it can protect data from unwanted attacks. Additionally, they have highlighted the problems with wireless security systems, such as eavesdropping, and the importance of addressing these issues for a safe and secure wireless network. In this article, the writer will give information deeply about Handling security problems on wireless with WPA (Wi-Fi Protected Access) encryption technology.

What is WPA?

WPA (Wi-Fi Protected Access) technology is a wireless network security standard designed to replace the previous security standard WEP (Wired Equivalent Privacy). WPA uses Temporal Key Integrity Protocol (TKIP) encryption to secure data sent over wireless networks. The main purpose of WPA is to improve the security of wireless networks and protect data from unwanted attacks. In use, WPA uses encryption keys that are stronger and more difficult for unauthorized people to break through. WPA also has an authentication feature, which ensures that only authorized devices can connect to the wireless network. WPA also has a more secure version called WPA2. In its development, WPA2 became the most widely used security standard on wireless networks today. By using WPA technology, wireless network users can feel more secure and protected from potentially damaging attacks.

Halaman Selanjutnya


BERI NILAI

Bagaimana reaksi Anda tentang artikel ini?

BERI KOMENTAR

Kirim

Konten Terkait


Video Pilihan

Terpopuler

Nilai Tertinggi

Feature Article

Terbaru

Headline