Nt1310 Unit 5 Security Protection

Good Essays
|Security Protection |Brief Description |Vulnerabilities |Prevention |
|MAC address filtering |refers to a security access |While the restriction of network access|While giving a wireless |
| |control method whereby the |through the use of lists is |network some additional |
| |48-bit address assigned to each |straightforward, an individual person |protection, MAC filtering can |
| |network card is used to |is not identified by a MAC address, |be circumvented by scanning a |
|
…show more content…
This|
| | |would use to access the network. |can be done in the Windows |
| | | |Registry or by using |
| | | |commandline tools on a Linux |
| | | |platform.
…show more content…
However, |Equivalent Privacy) protocol |
| |standard. It consists of a |the easy availability of inexpensive |to provide better |
| |simple authentication request |equipment also gives attackers the |communication security, |
| |containing the station ID and an|tools to launch attacks on the network.|however it is important to |
| |authentication response |The design flaws in the security |note that the authentication |
| |containing success or failure |mechanisms of the 802.11 standard also |management frames are still |
| |data. |give rise to a number of potential |sent in clear text during |
| | |attacks, both passive and active. These|authentication process. WEP

You May Also Find These Documents Helpful

  • Powerful Essays

    - to provide a means of connecting devices to the network and controlling which ones are allowed.…

    • 688 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    IT-241 Appendix G

    • 369 Words
    • 2 Pages

    Only allows access to a device if its MAC address matches that of a pre-approved list on the router.…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Lab 2

    • 86 Words
    • 1 Page

    Subnet Mask . . . . . . . . . . . : 255.255.255.0…

    • 86 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Management and control frames: 802.11 frames defined for some overhead function in 802.11, instead of being a data frame, which carries upper-layer information.…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Case Study

    • 257 Words
    • 2 Pages

    1. The first standard was created in 1997 by the Institutue of Electrical and Electronics Engineers (IEEE). They called it 802.11 which only supported a maximum network bandwidth of 2 Mbps- too slow for most applications.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hit-150-Wk4D1

    • 539 Words
    • 3 Pages

    (1) security features or software that protect information when a wireless network is used. (2) non-redisclosure policies. (3) storage and retention policies.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This was done as part of the ADSL Router and Cisco configuration Controller. The composition contained in the composition of ADSL factors. DHCP is created in the ADSL Router at the same time we will stop using DHCP server that is part of Windows Server 2008. The operating systems for the security of wireless networks are configured using WPA2 / WPA Mixed type. MAC made pass through a filter to allow only certain devices to connect to the Internet through various wireless networks white list their own MAC addresses. ADSL Router has also integrated firewall protection. This is configured with the default selections. It has an access point also some parental controls to prevent some of the sites. It is configured…

    • 914 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    "Six Things That Block Your Wi-Fi, and How to Fix Them." PCWorld. N.p., 20 Jan.…

    • 3783 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    | |communications between them. A collection of client PC’s into a central server is |…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lan Consulting Plan

    • 2879 Words
    • 12 Pages

    Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies.…

    • 2879 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    8. Most networks use DHCP to dynamically assign addresses and configure computers to use them…

    • 210 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Network Design

    • 1434 Words
    • 5 Pages

    In order to differentiate between students, staff, and instructors, we will place them on different subnets. Also, the instructors subnet will begin with a “1” in the third octet, the staff subnet will begin with a “3”, and the students subnet will begin with a “4” or “5” in the third octet of the IP addresses. Lastly, the second digit of the third octet will assign the floor for each subnet. An even number in the second digit will mean that the computer or device on the subnet is located on the first floor and an odd number means that it is located on the second floor.…

    • 1434 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    | Access control allows the network to prevent outside access that is unauthorized and really watch what is happening on the network.…

    • 489 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The security analyst of the accounting firm suggested that it's a good practice to have a dedicated room for server’s equipment to avoid any damages. This could be quite costly for the small company, however it would make a good investment in order to secure the company's network. The servers would be positioned on a server rack in the designated room with network devices such as modems, switches, routers, firewalls, and the Intrusion Detection System. This room should have restricted access and only authorized personnel must have access to it, by using sophisticated keycard systems and even having additional security procedures such as biometrical readers etc. It was also proposed to get rid of Motorola SB3100 and Net Gear MR814 to increase…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    | |not optimal or are undefined, meaning the |not located on the network. This computer is |prompt opened. Type in “ipconfig/ release” followed by “ipconfig/ renew” to resolve |…

    • 328 Words
    • 2 Pages
    Good Essays