5.0 PHYSICAL SECURITY (5.4 UNDERSTAND WIRELESS NETWORK SECURITY (5.4…
5.0 PHYSICAL SECURITY
5.4 UNDERSTAND WIRELESS NETWORK SECURITY
5.4.6 secure a wireless communicationusing various technique and tools
Aunthentication in cybersecurity is important becauseit enables organization tokeep their network secure by permitting onlyauthentication users(or process) to acessits protected resources
types of authentication method depends on the use of a password file ,in which user IDsare stored togethar with hashes of the password associated with each user.
c) Default router identifier is wireless router connect to your modem and create a wireless signal in your homeor offices
b) Anti virus and anti spyware software and firewall an utility that searces a har disk for viruses and removes any that are found .Anty spyware consist of computer software that gather and report infomation about a computer user without the user knowledge or consent Afirewall come in a wide variety of form
a)Encryption is a network encryption is theprocess of encryption or encoding data and message transmitted or communication over a computer network
5.4.8IMPLEMENT SECURITY POLICY ON WIRELESS NETWORK
Disable access points during non-usage period
Ensure only authorized people can resetthe accesspoint
implement personal firewallls
Establish the wireless network on a separate VLAN
Ensure firmware is up to date in access points
Ensure only authorized people can reset the access point using bioetric
assin 'strong' password to access point
Statement of purpose and scope
Every security policy should clearly state the reason it is necessaryand the scope of its reach within the organization
5.4.7 DESCRIBE WIRELESS SECURITY POLICY
wireles security is the prevention of unauthorized access or damage to component using wireless network.Themost common typesof wireless security are wired Equivalent privacy(WEP) and wifi Protected Acess(WPA).WEP is a notoriously weak security standard
5.4.5 IDENTIFY WIRELESS STANDARD
802.11 wireless standard
is represent the IEEE designation for wireless networking .Several Wireless networking specification exist under the802.11 banner.The network + objevtive focus on 802.11,802.11a,802.11b,802.11g and 802.11n.All these standard use the Ethernet protocol and the CSMA/CA access method.
5.4.4 IDENTIFY TYPE OF WIRELESS THREATS AND ATTACKS
is the encrypted data can be captured as well,but its obviosly much harder for an attacker to decipher the encrypted data packets
is a experienced hacker or even casual snooper can easily monitor unprotected wireless data packets using tools such as AirMagnet and AiroPeek, which fully disclose the contents of wireless data packets
Denial of services (Dos)
attack effectively shut down or severely slow down the wireless network in a similar way that Dos attacks effect wired network for example floods of packet and packet of phishing
5.4.3 IDENTIFY COMPENENT OF WIRELESS NEWORK
is a network device for propagating wireless network signals beyond the typical boundary of a network
is a device that performs the functions of a router and also includes the function of a wireless access point.
is a hardware device that is generally attached to computer or other workstation device to allow it to connect to a wireless system
1)Wireless Access Point
Wireless Access point
is a networking hardware device that allow a wifi device to connect to a wired network.
5.4.2 DESCRIBE TYPES OF WIRELESS NETWORK
Lan to Lan
is a network of connected devices that exist within a specific location .LANs may be found in homes,offices,educational institution or other areas
Extension to wired
network are used if a single access point is not able to cover the entire area
Peer to Peer
network arequite common in small offices that do not use a dedicated file server
All client version of windows ,Mac and linux can function as nodes in a peer to peer network and allow their file to be shared
5.4.1 EXPLAIN WIRELESS NETWORK
Wireless is a computer network that uses wireless data connection between network nodes.
5.1 UNDERSTAND HARDENING PHYSICAL SECURITY
5.1.6 STATE THE CHALLENGES IN ENSURING PHYSICAL SECURITY
a convergence of threat and burden some complexity is burgeoning and a vast number of organization are simply unprepared
5.1.5 IDENTIFY SECURING NETWORK DEVICES
using automated security features
monitoring and managing devices
assigning administartive roles
securing devices access
securing the edge router
5.1.4 IMPLEMENT WORKPLACE SECURITY
5.Lockdown plus pc is apowerfull desktop security solution for personal.
4.desktop Lock is a computer securityprotection and access control software product
3.Access Denied XP Is a message when you opening the file or folder even though you are the administartor of the windowXP computer,then most likely you need to reset the file or folder oermission.
2.Access Lock is an easy to use security utility which can help you secure your desktop when you are away from your computer
1stsecurity Agent An excellent password protected security utility to secure windows based computer.
-it work under any windows platform and offer an administartive support for controlling which users are allowed to access your computer and the level of access each user may have
-you can choosethe restrict access tolots of control Panel applet function
-you can also assign separate system profile folder to each user ,
5.1.3 EXPLAIN BIOMETRIC IN PHYSICAL ELECTRIC
Biometric devices (devices that sample a physical or behavior trait)
for exampe: a fingerprint and compareit with the trait on file todetermine whetheryouare whoyou claim to be )provide an important first defense againts breakins
5.1.2INDENTIFY PHYSICAL SECURITY THREATS TO NETWORK
MAINTENANCE improper disaster planning triggers the maintenance threat.It includes lack of spare parts,poor cabling,incorrect or no labeling on components
ENVIRONMENT extreme weathercondition (such as moisture,EMI field,very high,or low temperature and humidity can also damage network devices.
ELECTRICAL irregular powersuply (such as fluctuation,high voltage,low voltage,or surge voltage )can cause serious damage to the network components.
PHYSICAL :improper installation ,selecting wrong components,incomplete devices,lack of knowledge,unsecure or less secure network components can couse physical threat to the critical network resources.
5.1.1 INDENTIFY THE NEED FOR PHYSICAL SECURITY
4) physical security is proving to be challenging than previous decades as there as there are more sensitive devices available like USB drives,laptops,smartphones and tablets that enables the stealing of data easy and smooth
3)it is necessary if you do not want anyone to snatch away your information or destroy it
2)prevent two factor of attack,nature and malicious party.The example of nature attack are flood,fire,and power fluctuation.The example of malicious party attack are terrorism ,vandalism and theft.
1) Protecting important data,confidential information,network,software,equipment,facilities,company asset and personnel