Please enable JavaScript.
Coggle requires JavaScript to display documents.
5.0 PHYSICAL SECURITY (5.4 UNDERSTAND WIRELESS NETWORK SECURITY (5.4…
5.0 PHYSICAL SECURITY
5.4 UNDERSTAND WIRELESS NETWORK SECURITY
5.4.1 EXPLAIN WIRELESS NETWORK
Wireless is a computer network that uses wireless data connection between network nodes.
5.4.2 DESCRIBE TYPES OF WIRELESS NETWORK
Peer to Peer
network arequite common in small offices that do not use a dedicated file server
All client version of windows ,Mac and linux can function as nodes in a peer to peer network and allow their file to be shared
Extension to wired
network are used if a single access point is not able to cover the entire area
Lan to Lan
is a network of connected devices that exist within a specific location .LANs may be found in homes,offices,educational institution or other areas
5.4.3 IDENTIFY COMPENENT OF WIRELESS NEWORK
1)Wireless Access Point
Wireless Access point
is a networking hardware device that allow a wifi device to connect to a wired network.
2)Wireless adapter
Wireless adapter
is a hardware device that is generally attached to computer or other workstation device to allow it to connect to a wireless system
3)wirelss router
wireless router
is a device that performs the functions of a router and also includes the function of a wireless access point.
4)Wireless Repeater
Wireless repeater
is a network device for propagating wireless network signals beyond the typical boundary of a network
5.4.4 IDENTIFY TYPE OF WIRELESS THREATS AND ATTACKS
-
Denial of services (Dos)
attack effectively shut down or severely slow down the wireless network in a similar way that Dos attacks effect wired network for example floods of packet and packet of phishing
-
Traffic monitoring
is a experienced hacker or even casual snooper can easily monitor unprotected wireless data packets using tools such as AirMagnet and AiroPeek, which fully disclose the contents of wireless data packets
-
Packet sniffing
is the encrypted data can be captured as well,but its obviosly much harder for an attacker to decipher the encrypted data packets
5.4.5 IDENTIFY WIRELESS STANDARD
802.11 wireless standard
is represent the IEEE designation for wireless networking .Several Wireless networking specification exist under the802.11 banner.The network + objevtive focus on 802.11,802.11a,802.11b,802.11g and 802.11n.All these standard use the Ethernet protocol and the CSMA/CA access method.
5.4.7 DESCRIBE WIRELESS SECURITY POLICY
wireles security is the prevention of unauthorized access or damage to component using wireless network.Themost common typesof wireless security are wired Equivalent privacy(WEP) and wifi Protected Acess(WPA).WEP is a notoriously weak security standard
5.4.8IMPLEMENT SECURITY POLICY ON WIRELESS NETWORK
Statement of purpose and scope
Every security policy should clearly state the reason it is necessaryand the scope of its reach within the organization
assin 'strong' password to access point
Ensure only authorized people can reset the access point using bioetric
Ensure firmware is up to date in access points
Establish the wireless network on a separate VLAN
implement personal firewallls
Ensure only authorized people can resetthe accesspoint
Disable access points during non-usage period
5.4.6 secure a wireless communicationusing various technique and tools
a)Encryption is a network encryption is theprocess of encryption or encoding data and message transmitted or communication over a computer network
b) Anti virus and anti spyware software and firewall an utility that searces a har disk for viruses and removes any that are found .Anty spyware consist of computer software that gather and report infomation about a computer user without the user knowledge or consent Afirewall come in a wide variety of form
c) Default router identifier is wireless router connect to your modem and create a wireless signal in your homeor offices
d)Aunthentication
types of authentication method depends on the use of a password file ,in which user IDsare stored togethar with hashes of the password associated with each user.
Aunthentication in cybersecurity is important becauseit enables organization tokeep their network secure by permitting onlyauthentication users(or process) to acessits protected resources
5.1 UNDERSTAND HARDENING PHYSICAL SECURITY
5.1.1 INDENTIFY THE NEED FOR PHYSICAL SECURITY
1) Protecting important data,confidential information,network,software,equipment,facilities,company asset and personnel
2)prevent two factor of attack,nature and malicious party.The example of nature attack are flood,fire,and power fluctuation.The example of malicious party attack are terrorism ,vandalism and theft.
3)it is necessary if you do not want anyone to snatch away your information or destroy it
4) physical security is proving to be challenging than previous decades as there as there are more sensitive devices available like USB drives,laptops,smartphones and tablets that enables the stealing of data easy and smooth
5.1.2INDENTIFY PHYSICAL SECURITY THREATS TO NETWORK
PHYSICAL :improper installation ,selecting wrong components,incomplete devices,lack of knowledge,unsecure or less secure network components can couse physical threat to the critical network resources.
ELECTRICAL irregular powersuply (such as fluctuation,high voltage,low voltage,or surge voltage )can cause serious damage to the network components.
ENVIRONMENT extreme weathercondition (such as moisture,EMI field,very high,or low temperature and humidity can also damage network devices.
MAINTENANCE improper disaster planning triggers the maintenance threat.It includes lack of spare parts,poor cabling,incorrect or no labeling on components
5.1.3 EXPLAIN BIOMETRIC IN PHYSICAL ELECTRIC
Biometric devices (devices that sample a physical or behavior trait)
for exampe: a fingerprint and compareit with the trait on file todetermine whetheryouare whoyou claim to be )provide an important first defense againts breakins
5.1.4 IMPLEMENT WORKPLACE SECURITY
1stsecurity Agent An excellent password protected security utility to secure windows based computer.
-it work under any windows platform and offer an administartive support for controlling which users are allowed to access your computer and the level of access each user may have
-you can choosethe restrict access tolots of control Panel applet function
-you can also assign separate system profile folder to each user ,
2.Access Lock is an easy to use security utility which can help you secure your desktop when you are away from your computer
3.Access Denied XP Is a message when you opening the file or folder even though you are the administartor of the windowXP computer,then most likely you need to reset the file or folder oermission.
4.desktop Lock is a computer securityprotection and access control software product
5.Lockdown plus pc is apowerfull desktop security solution for personal.
5.1.5 IDENTIFY SECURING NETWORK DEVICES
securing the edge router
securing devices access
assigning administartive roles
monitoring and managing devices
using automated security features
5.1.6 STATE THE CHALLENGES IN ENSURING PHYSICAL SECURITY
a convergence of threat and burden some complexity is burgeoning and a vast number of organization are simply unprepared