Configure key encryption

Configure key encryption

Summary

The organization must prefer the use of WPA2 Personal or WPA2 Enterprise (802.1x) key encryption methods.

Description

WPA2 (Wi-Fi Protected Access 2) is a significant improvement over its predecessor, WPA. WPA2 employs stronger encryption algorithms, making it more resistant to wireless attacks. The implementation of WPA2 Personal or WPA2 Enterprise (802.1x) key encryption methods is an essential method to establish a secure Wi-Fi network. It ensures strong encryption, and robust authentication.

Supported In

This requirement is verified in following services

Plan Supported
Essential 🔴
Advanced 🟢

References

Vulnerabilities

Free trial message
Free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.