SlideShare a Scribd company logo
8/20/21 Co-channel interference will be all but eliminated.
Jeffrey Green The 6 GHz band is also cleaner “pure”. Section 1.1
6 GHz with new security technology!
8/20/21 Co-channel interference will be all but eliminated.
Jeffrey Green The 6 GHz band is also cleaner “pure”. Section 1.2
OWE – Enhanced Open.
The OWE protocol integrates cryptography mechanisms to provide each user with unique
individual encryption, protecting the data exchange. The experience for the user is the same as
with open security because there is no need to enter a password or passphrase.
Mitigation of Malicious eavesdropping.
SAE – Simultaneous Authentication of Equals.
A WPA3-Personal access point (AP) in transition mode enables WPA2-Personal and WPA3-
Personal simultaneously on a single basic service set (BSS) to support client devices using a mix
of WPA2-Personal and WPA3-Personal with the same passphrase. Client devices that support
both WPA2-Personal and WPA3-Personal connect using the higher-security method of WPA3-
Personal when available.
OWE provides encryption without authentication.
By far, the most significant change defined by WPA3 is the replacement of PSK authentication
with Simultaneous Authentication of Equals(SAE), which is resistant to offline dictionary
attacks. SAE leverages on a Dragonfly key exchange. Dragonfly is a patent-free and royalty-free
technology that uses a zero-knowledge proof key exchange.
• Opportunistic Wireless
Encryption (OWE)
• Encryption without
authentication
• Enhanced Open
certification is not part of
WPA3 and is an entirely
different and optional
security certification
WPA3 Personal
• WPA3 replacement for PSK.
• Password key exchange based
on a zero-knowledge proof.
• Prove you know the
credentials without
compromising the credentials.
• No forging, modification or
replay attacks.
• No offline dictionary attacks.
8/20/21 Co-channel interference will be all but eliminated.
Jeffrey Green The 6 GHz band is also cleaner “pure”. Section 1.3
The goal is to provide the same user experience by still using a passphrase.i
The OWE experience for the user is the same as open security because there is no need to enter
a password or passphrase before joining the network. Data privacy protects against malicious
eavesdropping attacks. Nevertheless, please understand that there is zero authentication security.
Enhanced Open is not part of WPA3 and is an entirely different and optional security
certification for 2.4 GHz and 5 GHz frequency bands.ii
SAE leverages Dragonfly key exchange.
Customers understand that Enhanced Open meets only half of the requirements for well-
rounded Wi-Fi security. OWE does provide encryption and data privacy, but there is no
authentication whatsoever. As previously mentioned, Enhanced Open is an optional security
certification. As a result, many WLAN vendors still do not support OWE, and client-side
support is marginal at best but growing. Therefore, tactical deployments of OWE in the 2.4 and
5 GHz frequency bands are currently scarce. iiiiv
WIPs and 6 GHz.
Existing WIPS solutions will
NOT be able to detect 6 GHz
rogue APs and attacks.
Current sensors do not have 6
GHz radios.
The vendors with tri-band
sensor capabilities will take
the lead for WIPs in the 6 GHz
band.
8/20/21 Co-channel interference will be all but eliminated.
Jeffrey Green The 6 GHz band is also cleaner “pure”. Section 1.4
i
https://www.extremenetworks.com/extreme-networks-blog/wireless-security-in-a-6-ghz-wi-fi-6e-world/
ii
https://www.extremenetworks.com/extreme-networks-blog/wireless-security-in-a-6-ghz-wi-fi-6e-world/
iv
ttps://www.extremenetworks.com/extreme-networks-blog/wireless-security-in-a-6-ghz-wi-fi-6e-world/

More Related Content

What's hot

Future of Telecommunication Technologies
Future of Telecommunication TechnologiesFuture of Telecommunication Technologies
Future of Telecommunication TechnologiesYashraj Nigam
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.igede tirtanata
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliationGurjan Oberoi
 
عرض الشبكات السلكية واللاسلكية والإنترنت 04
عرض الشبكات السلكية واللاسلكية والإنترنت 04عرض الشبكات السلكية واللاسلكية والإنترنت 04
عرض الشبكات السلكية واللاسلكية والإنترنت 04نوافذ حاسوبية
 
How to migrate legacy serial devices to IP broadband
How to migrate legacy serial devices to IP broadbandHow to migrate legacy serial devices to IP broadband
How to migrate legacy serial devices to IP broadbandWestermo Network Technologies
 
Lorawan: What you need to know
Lorawan: What you need to knowLorawan: What you need to know
Lorawan: What you need to knowPaul Coomans
 
zigbee technology
zigbee technology zigbee technology
zigbee technology N.CH Karthik
 
Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?AirTight Networks
 
Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaMayank Saxena
 
WLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use cases
WLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use casesWLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use cases
WLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use casesPramod Kumar
 
Beginners: Top 10 Misconceptions About 5G
Beginners: Top 10 Misconceptions About 5GBeginners: Top 10 Misconceptions About 5G
Beginners: Top 10 Misconceptions About 5G3G4G
 
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative Study
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative StudyIRJET- Wi-Fi, WiMAX & WiGig: A Comparative Study
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative StudyIRJET Journal
 

What's hot (19)

Wi-Fi Module
Wi-Fi ModuleWi-Fi Module
Wi-Fi Module
 
Future of Telecommunication Technologies
Future of Telecommunication TechnologiesFuture of Telecommunication Technologies
Future of Telecommunication Technologies
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
 
Accessing remote networks
Accessing remote networksAccessing remote networks
Accessing remote networks
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
New Cisco Access Points
New Cisco Access PointsNew Cisco Access Points
New Cisco Access Points
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliation
 
عرض الشبكات السلكية واللاسلكية والإنترنت 04
عرض الشبكات السلكية واللاسلكية والإنترنت 04عرض الشبكات السلكية واللاسلكية والإنترنت 04
عرض الشبكات السلكية واللاسلكية والإنترنت 04
 
How to migrate legacy serial devices to IP broadband
How to migrate legacy serial devices to IP broadbandHow to migrate legacy serial devices to IP broadband
How to migrate legacy serial devices to IP broadband
 
Corporation Tech
Corporation TechCorporation Tech
Corporation Tech
 
Ap8163 datasheet
Ap8163 datasheetAp8163 datasheet
Ap8163 datasheet
 
Lorawan: What you need to know
Lorawan: What you need to knowLorawan: What you need to know
Lorawan: What you need to know
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
 
Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?
 
Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank Saxena
 
WLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use cases
WLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use casesWLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use cases
WLAN(802.11AX - WI-FI 6) Evolution, frequency band, channels & use cases
 
Lora vs Zigbee
Lora vs ZigbeeLora vs Zigbee
Lora vs Zigbee
 
Beginners: Top 10 Misconceptions About 5G
Beginners: Top 10 Misconceptions About 5GBeginners: Top 10 Misconceptions About 5G
Beginners: Top 10 Misconceptions About 5G
 
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative Study
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative StudyIRJET- Wi-Fi, WiMAX & WiGig: A Comparative Study
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative Study
 

Similar to 6 e security

Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiAgreeta Sharma
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksChema Alonso
 
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...CSCJournals
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISIJNSA Journal
 
Databook 2018 ver2
Databook 2018 ver2Databook 2018 ver2
Databook 2018 ver2DrayTek
 
Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Wail Hassan
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 

Similar to 6 e security (20)

Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi Fi
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
 
Databook 2018 ver2
Databook 2018 ver2Databook 2018 ver2
Databook 2018 ver2
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Overview of WLAN security functions (ENG)
Overview of WLAN security functions (ENG)Overview of WLAN security functions (ENG)
Overview of WLAN security functions (ENG)
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Lec 6.pptx
Lec 6.pptxLec 6.pptx
Lec 6.pptx
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Wireless security
Wireless securityWireless security
Wireless security
 

More from Jeff Green

The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)Jeff Green
 
The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)Jeff Green
 
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)Jeff Green
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)Jeff Green
 
The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)Jeff Green
 
Places in the network (featuring policy)
Places in the network (featuring policy)Places in the network (featuring policy)
Places in the network (featuring policy)Jeff Green
 
Elephant & mice flows
Elephant & mice flowsElephant & mice flows
Elephant & mice flowsJeff Green
 
Fortinet ngf w extreme policy
Fortinet ngf w extreme policyFortinet ngf w extreme policy
Fortinet ngf w extreme policyJeff Green
 
Multi fabric sales motions jg v3
Multi fabric sales motions jg v3Multi fabric sales motions jg v3
Multi fabric sales motions jg v3Jeff Green
 
Data center pov 2017 v3
Data center pov 2017 v3Data center pov 2017 v3
Data center pov 2017 v3Jeff Green
 
Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)Jeff Green
 
Avb pov 2017 v2
Avb pov 2017 v2Avb pov 2017 v2
Avb pov 2017 v2Jeff Green
 
Layer 2 forwarding on an spb fabric
Layer 2 forwarding on an spb fabricLayer 2 forwarding on an spb fabric
Layer 2 forwarding on an spb fabricJeff Green
 
8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)Jeff Green
 
12.) fabric (your next data center)
12.) fabric (your next data center)12.) fabric (your next data center)
12.) fabric (your next data center)Jeff Green
 
4.) switch performance (w features)
4.) switch performance (w features)4.) switch performance (w features)
4.) switch performance (w features)Jeff Green
 
20.) physical (optics copper and power)
20.) physical (optics copper and power)20.) physical (optics copper and power)
20.) physical (optics copper and power)Jeff Green
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)Jeff Green
 
17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)Jeff Green
 

More from Jeff Green (20)

The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)
 
The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)
 
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)
 
The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)
 
Places in the network (featuring policy)
Places in the network (featuring policy)Places in the network (featuring policy)
Places in the network (featuring policy)
 
Elephant & mice flows
Elephant & mice flowsElephant & mice flows
Elephant & mice flows
 
Fortinet ngf w extreme policy
Fortinet ngf w extreme policyFortinet ngf w extreme policy
Fortinet ngf w extreme policy
 
Multi fabric sales motions jg v3
Multi fabric sales motions jg v3Multi fabric sales motions jg v3
Multi fabric sales motions jg v3
 
Data center pov 2017 v3
Data center pov 2017 v3Data center pov 2017 v3
Data center pov 2017 v3
 
Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)
 
Avb pov 2017 v2
Avb pov 2017 v2Avb pov 2017 v2
Avb pov 2017 v2
 
Layer 2 forwarding on an spb fabric
Layer 2 forwarding on an spb fabricLayer 2 forwarding on an spb fabric
Layer 2 forwarding on an spb fabric
 
8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)
 
12.) fabric (your next data center)
12.) fabric (your next data center)12.) fabric (your next data center)
12.) fabric (your next data center)
 
10.) vxlan
10.) vxlan10.) vxlan
10.) vxlan
 
4.) switch performance (w features)
4.) switch performance (w features)4.) switch performance (w features)
4.) switch performance (w features)
 
20.) physical (optics copper and power)
20.) physical (optics copper and power)20.) physical (optics copper and power)
20.) physical (optics copper and power)
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
 
17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfalexjohnson7307
 

Recently uploaded (20)

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 

6 e security

  • 1. 8/20/21 Co-channel interference will be all but eliminated. Jeffrey Green The 6 GHz band is also cleaner “pure”. Section 1.1 6 GHz with new security technology!
  • 2. 8/20/21 Co-channel interference will be all but eliminated. Jeffrey Green The 6 GHz band is also cleaner “pure”. Section 1.2 OWE – Enhanced Open. The OWE protocol integrates cryptography mechanisms to provide each user with unique individual encryption, protecting the data exchange. The experience for the user is the same as with open security because there is no need to enter a password or passphrase. Mitigation of Malicious eavesdropping. SAE – Simultaneous Authentication of Equals. A WPA3-Personal access point (AP) in transition mode enables WPA2-Personal and WPA3- Personal simultaneously on a single basic service set (BSS) to support client devices using a mix of WPA2-Personal and WPA3-Personal with the same passphrase. Client devices that support both WPA2-Personal and WPA3-Personal connect using the higher-security method of WPA3- Personal when available. OWE provides encryption without authentication. By far, the most significant change defined by WPA3 is the replacement of PSK authentication with Simultaneous Authentication of Equals(SAE), which is resistant to offline dictionary attacks. SAE leverages on a Dragonfly key exchange. Dragonfly is a patent-free and royalty-free technology that uses a zero-knowledge proof key exchange. • Opportunistic Wireless Encryption (OWE) • Encryption without authentication • Enhanced Open certification is not part of WPA3 and is an entirely different and optional security certification WPA3 Personal • WPA3 replacement for PSK. • Password key exchange based on a zero-knowledge proof. • Prove you know the credentials without compromising the credentials. • No forging, modification or replay attacks. • No offline dictionary attacks.
  • 3. 8/20/21 Co-channel interference will be all but eliminated. Jeffrey Green The 6 GHz band is also cleaner “pure”. Section 1.3 The goal is to provide the same user experience by still using a passphrase.i The OWE experience for the user is the same as open security because there is no need to enter a password or passphrase before joining the network. Data privacy protects against malicious eavesdropping attacks. Nevertheless, please understand that there is zero authentication security. Enhanced Open is not part of WPA3 and is an entirely different and optional security certification for 2.4 GHz and 5 GHz frequency bands.ii SAE leverages Dragonfly key exchange. Customers understand that Enhanced Open meets only half of the requirements for well- rounded Wi-Fi security. OWE does provide encryption and data privacy, but there is no authentication whatsoever. As previously mentioned, Enhanced Open is an optional security certification. As a result, many WLAN vendors still do not support OWE, and client-side support is marginal at best but growing. Therefore, tactical deployments of OWE in the 2.4 and 5 GHz frequency bands are currently scarce. iiiiv WIPs and 6 GHz. Existing WIPS solutions will NOT be able to detect 6 GHz rogue APs and attacks. Current sensors do not have 6 GHz radios. The vendors with tri-band sensor capabilities will take the lead for WIPs in the 6 GHz band.
  • 4. 8/20/21 Co-channel interference will be all but eliminated. Jeffrey Green The 6 GHz band is also cleaner “pure”. Section 1.4 i https://www.extremenetworks.com/extreme-networks-blog/wireless-security-in-a-6-ghz-wi-fi-6e-world/ ii https://www.extremenetworks.com/extreme-networks-blog/wireless-security-in-a-6-ghz-wi-fi-6e-world/ iv ttps://www.extremenetworks.com/extreme-networks-blog/wireless-security-in-a-6-ghz-wi-fi-6e-world/