Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How is ITaP addressing security issues with PAL?

ADDRESSING ITap PAL security
0
Posted

How is ITaP addressing security issues with PAL?

0

ITaP is committed to providing our users with a trusted computing environment. With the introduction of PAL2.0, users now have a choice as to the method they use to connect to Purdue’s wireless network: by using WPA or using a VPN (Virtual Private Network) connection. WPA, described above provides secure, authenticated access to PAL and give users the freedom to roam throughout coverage areas without losing their wireless connection (in most cases). VPN technology requires users to authenticate themselves before using the wireless network, and encrypts all of the data that is carried on the wireless network. With a VPN-secured connection, all of the wireless traffic is encrypted using a strong encryption algorithm (168-bit 3DES encryption, as compared to the 128-bit or even 40-bit encryption offered by WEP). This means that, in order to access PAL, users will be required to adjust their computer’s network settings to negotiate the VPN connection directly or use WPA, and then to login t

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123