This research paper explores and analyzes the security benefits and threats associated with WPA revisions on its strength and weaknesses. It covers the security features, benefits, and security threats of WPA, WPA 2, and WPA 3 protocols. The paper also includes research methods used to analyze the security issues linked with WPA networks.