Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Wi-Fi Protected Access 2 (WPA2)

Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance
This replacement security method for WPA for wireless networks that provides stronger data protection and network access control. It provides enterprise and consumer Wi-Fi users with a high level of assurance that only authorized users can access their wireless networks. Based on the ratified IEEE 802.11i standard, WPA2 provides government-grade security by implementing the National Institute of Standarss and technology (NIST) FIPS 140-2 compliant advanced encryption standard (AES) encryption algorithm and 802.1X-based authentication.
Published in Chapter:
Can Total Quality Management Exist in Cyber Security: Is It Present? Are We Safe?
Mahesh S. Raisinghani (Texas Woman's University, USA)
DOI: 10.4018/978-1-4666-6324-4.ch022
Abstract
This chapter examines the threats in cyber security. It identifies the risk of cyber attacks and argues the inability to defend against those threats in a cyber security program. The introduction provides a brief history of cyber security and how the information highway arrived at this point in cyber security. The first analysis examines the threats in cyber security in personal, private, and government computer systems. The second analysis examines the approaches to attacking those systems. The third analysis examines threats against private companies and government agencies. The final analysis examines major threats to cyber security.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR