What are some of the PSK key management weaknesses?

What will be an ideal response?


PSK key management weaknesses include the following:
* Like WEP, the distribution and sharing of PSK keys is performed manually without any technology security protections. The keys can be distributed by telephone, e-mail, or a text message (none of which are secure). Any user who obtains the key is assumed to be authentic and approved.
* Unlike WEP, in which four keys can be used, PSK only uses a single key. Should this one PSK key be compromised by an unauthorized attacker the entire WLAN would become vulnerable.
* Standard security practices call for keys to be changed on a regular basis. Changing the PSK key requires reconfiguring the key on every wireless device and on all access points.
* To allow a guest user to have access to a PSK WLAN, the key must be given to that guest. Once the guest departs, this shared secret must be changed on all devices to ensure adequate security for the PSK WLAN.

Computer Science & Information Technology

You might also like to view...

The _________________________ Tool changes pixels in the image as you drag through them.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

HTML supports tags that allow you to create forms and analyze the information submitted on forms.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Summary statistics describe a collection of ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The first window displayed when you install openSUSE is the ____ window.

A. Boot Options B. Configuration C. System Options D. Welcome

Computer Science & Information Technology