Wireless networking has evolved from a convenience technology to the primary connectivity method for most endpoints in modern organisations. The CISSP exam tests wireless security across multiple technologies: the Wi-Fi security protocol evolution, Bluetooth vulnerabilities, 5G architecture changes, IoT wireless protocols, and the detection of wireless attacks. Each technology has distinct vulnerabilities and controls that the exam tests in scenario form.

WEP to WPA3: The Security Protocol Evolution

Understanding why each generation of Wi-Fi security was replaced is more important for the exam than memorising technical details. Each protocol's successor addressed the specific vulnerabilities that made its predecessor insecure.

Wired Equivalent Privacy (WEP) was introduced in 1997 as the first Wi-Fi security protocol. It used RC4 stream cipher with a 40-bit (later 104-bit) key combined with a 24-bit Initialization Vector (IV). WEP was fundamentally broken by 2001. The 24-bit IV was too short, causing IV reuse frequently (especially on busy networks). IV reuse allowed attackers to analyse multiple ciphertexts encrypted with the same keystream and recover the key using statistical attacks. Additionally, WEP used CRC-32 for integrity, which is not cryptographically secure — an attacker could modify packets and recalculate the CRC to match. WEP is completely broken and can be cracked in minutes with freely available tools. It should never be used.

Wi-Fi Protected Access (WPA) was introduced in 2003 as an interim improvement while the full 802.11i standard was developed. WPA used TKIP (Temporal Key Integrity Protocol) with RC4 — a significant improvement over WEP because TKIP generated a new key for each packet. WPA also added MIC (Message Integrity Code) to replace WEP's broken CRC. However, TKIP was eventually found vulnerable to attacks and WPA is now deprecated.

WPA2, introduced in 2004, implemented the full 802.11i standard. It replaced RC4/TKIP with AES-CCMP (Advanced Encryption Standard in Counter Mode with CBC-MAC Protocol), which is significantly more secure. WPA2 remained the standard for over a decade. WPA2-Personal (PSK) uses a pre-shared passphrase for authentication. WPA2-Enterprise uses 802.1X with RADIUS for individual user authentication — each user authenticates with their own credentials rather than a shared password. WPA2 is vulnerable to KRACK (Key Reinstallation Attack), disclosed in 2017, though KRACK primarily requires local network access and has largely been patched.