Encryption
Scrambke texts in cipher text, master key required for understanding text, readable but cannot be understood
What are different protocols used for wireless encryption
WEP, WPA, WPA2, handshaking protocl used to ensure user has valid master key before transmission to device begins