Network System Security: P2 Describe how networked systems can be ... [PDF]

Mar 1, 2014 - P2 Describe how networked systems can be protected. What is spamming. Spamming is the process of flooding

6 downloads 37 Views 151KB Size

Recommend Stories


Networked Systems Demo (PDF)
Almost everything will work again if you unplug it for a few minutes, including you. Anne Lamott

How Simple Can Gravity Be?
I tried to make sense of the Four Books, until love arrived, and it all became a single syllable. Yunus

How can Mecca be saved?
When you talk, you are only repeating what you already know. But if you listen, you may learn something

How Geographic Information Systems can be used in a
I tried to make sense of the Four Books, until love arrived, and it all became a single syllable. Yunus

How can Guidance Work be Organized
The wound is the place where the Light enters you. Rumi

How binding can an EU referendum be?
Don’t grieve. Anything you lose comes round in another form. Rumi

How Efficient can Memory Checking be?
No amount of guilt can solve the past, and no amount of anxiety can change the future. Anonymous

How Constitutional Can the European Union Be?
You have to expect things of yourself before you can do them. Michael Jordan

How can original sin be inherited?
Learn to light a candle in the darkest moments of someone’s life. Be the light that helps others see; i

New technology & how it can be used
Your big opportunity may be right where you are now. Napoleon Hill

Idea Transcript


More Next Blog»

Create Blog Sign In

Network System Security SATURDAY, 1 MARCH 2014

BLOG ARCHIVE

t 2014 (5)

P2 Describe how networked systems can be protected

May (1) t March (2) Explain the operation of different intruder detect...

P2 DESCRIBE HOW NETWORKED SYSTEMS CAN BE PROTECTED

P2 Describe how networked systems can be protected... February (1)

What is spamming

January (1)

Spamming is the process of flooding the internet with multiple copies of the same email, in an attempt to take up valuable resources on the network and also force the message onto people who are not expecting to receive it. The main majority of spam is used for commercial advertising.

ABOUT ME

How to prevent it

View my complete profile

Secure MIME Secure/ multi-purpose Internet mail extension is a method for protecting email. The protocol will encrypt all incoming and outgoing email, which will prevent people from understanding the information within the email. It will also confirm the identity of the sender to confirm that it is a legitimate genience message sent from that address. Spam Guard Spam Guard are installed in email servers, such as Hotmail and Gmail. Spam Guard will identify spam emails and block and remove the email beforeit reaches the end user or stores the email in the spam folder. As more spam emails enters the server, Spam Guard has the ability to update itself by self-learning to protect against the new spam emails. Hoaxing Hoaxing is the method of sending fake emails to multiple addresses to gain personal information through phishing. For example, an attacker would send an email claiming to be someone from their bank, asking the user to update his banking details. Attackers will use software to fake the from email address to appear to be from a ligament source. Spam Guard will block most of these emails but some emails may still be able to pass through the system. This is why necessary training and configuration is needed to ensure the protection and security of an email. Wireless networked security WEP/WPA security WEP is short for wired equipment privacy, is a method of encrypting data over IEEE 802.11 wireless. Wireless network are broadcast using radio waves, which allows attackers to potentially gain access to your network. WEP is a very weak method of encryption and can be intercepted easily. WPA Wi-Fi protected access is a much better method of protect networks because it uses both encryption combined with access controls and users authentication. WPA use 128-bit encryption keys and dynamic session keys to ensure that your wireless network is protected. MAC Association MAC association is another method of protecting your network. The user will set MAC association by providing the DHCP server with a list of all of the computers MAC addresses that have permission to access the network. Only one computer can have a certain mac address, which can make it very difficult for attackers to gain access to your network. Networked devices security Wireless Access Point ID Another method of protecting you wireless network is by changing the name of your SSID (router name). The reason why you change the router name is because it prevents attacks from knowing what router you have, which they can use to gain access to your wireless network by the means of using common passwords for that router. For example, the administrator password for virgin is “changeme”. Using the combination of the original SSID and this simple password, attackers can gain access to your network. You can prevent these attacks from happening by making sure that your router has been configured properly and there are no open accounts for unauthorised people to enter in. Use of transmission media Shielded cable Using shielded cables can provide more security because it provides addition protect by preventing attacks from attaching a tapping device to the network. Unshielded cables are not as safe as shielded cables and can be easily accessed by attacks who want to listen in Personal Access Control There are many methods of access control, including: Password – Something you know, passwords are the most common of access control but they are not very secure. Attackers can guess your password or use a range of techniques to obtain your password information Biometrics-Something you are, is using yourself to gain access to a certain room or building. For example, you may have to scan your finger print to allow access into the server room. This method is secure because it is difficult for attacks to gain access to this information. Permission-Something you have, such as an ID card. This is also a secure method as you will need the card to gain access. However, this is not as secure as the Biometrics because you could have your card stolen, which attackers can use to gain access before it is disabled. A combination of two of three of these will require the attacker to have to break all of these protection controls which will make it more secure. Use of encryption Encryption is converting the data into an unreadable format, in order to decrypt the information you will need the correct decryption program and passphrase/key to convert it back into a original format. This is a very effective method of protecting your data because only authorised people with the decryption code will be able to view the data. Posted by Timothy King at 08:47

No comments: Post a Comment

Newer Post

Home

Older Post

Subscribe to: Post Comments (Atom)

Picture Window theme. Powered by Blogger.

Timothy King Follow

0

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.