"Wireless Penetration and Securing Wireless" Please respond to the following:
- Specify the main steps involved in cracking WEP encryption. Discuss the implications of relying on such a legacy protocol today and how essential it is for the IT industry to keep current with technology.
- Compare the key added challenges of securing wirelessly-connected devices versus securing LAN-connected devices. Next, discuss the so-called "cloaking" as it pertains to Wi-Fi networks. Analyze the reasoning behind enabling or disabling this feature.