Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 5 PHYSICAL SECURITY (5.4 WIRELESS NETWORK (wireless network…
CHAPTER 5 PHYSICAL SECURITY
5.1 PHYSICAL SECURITY
The need for physical security
-To prevent any unauthorized access to the computer systems
Physical Security Threats To Network
Hardware threats
-Electrical treats
-Environmental threats
-Maintenance threats
Biometrics in Physical Security
Uses person's unique Physical characteristics for authentication
Fingerprint scanners most common type & face, hand, or eye characteristics also used
Implement Workplace Security
a.) 1st Security Agent - is a password-protected security utility to secure Windows based computers.
b.) Access Lock - is an easy to use system tray security utility you can use to secure your desktop when you are away from your computer.
c.) Access Denied XP - is a security program for windows 2000/XP
d.) Desktop Lock - Lock is acomputer ecurity protection and access control software product, you can use it to lock computer to prevent people from accessing your private documents and resources.
e.) Lockdown Plus PC - is a network based desktop security solution for publicity accessible computers running the Windows 2000/XP/Server 2003 Operating Systems.
f.) PC LockUp - is a computer security software, which enables you to apply password protection to Windows and restrict others from being able to use your PC while you are away.
5.2 UNDERSTAND SECURING MODEMS
Define security Modems - is a hardware component that allows a computer or other device, such as a router or switch, to connect to the internet and make sure remain safe and unthreatened by unauthorized users.
Identify Types Of Modems
Internal Modem- A modem that fits inside of a computer and can be powered on computers own power supply (PCI Modem)
External Modem- sits outside the computer and it is unable to fit inside the computer
Exlplain network attacks and risks involve in modems
:a.) Share nature of cable Connections - All subscribers in local area can shared the same subnet when the connecting with cable modem.
b.) Speed - Users make more atrractive by the speed of network and allows the intruder to quickly deposit trojan horses, hacker toolkits and sensitive documents.
c.) Hackers can launch DoS attacks against targeted network resources or the entire network.
Explain the reason for modem failures
Signal from the cabel outlet
Modem or phone line aren't stable at high connect speeds
The synchronization process
A modem which is reset
The power supply is interrupted
Hacked by unauthorized users
5.3 IMPLEMENT HARDENING ROUTERS
Define routers, metrics, algorithms and IOS
Router metrics are metrics used by a router to make routing decisions. A metric is typically one of many fields in a routing table.A routing algorithms is a set of step-by-step operation used to direct internal traffic. Cisco IOS is a proprietary operating system that runs on most Cisco Sytems routers and switches.
Adhere to the steps to harden a router
change the default password
disable IP directed broadcasts
disable HTTP configuration for the router, if possible
block ICMP ping requests
disable IP source routing
determine your packet filtering needs
establish ingress and egress address filtering policies
maintain physical security of the router
take the time to review the security logs
Apply access control list based on security policy
when a subjects requested an object in an ACL-based security model, the OS initially checks the ACL for an applicable entry to decide whether the requested operation is authorized.
List ways to secure the routers
Understand the basics of router security.
Physically secure the routers.
Lock down the router with passwords.
Enable proper logging.
Back up router configuration to a central source.
Secure other network devices.
know your network .
protect your router with a firewall and ACLs
change your passwords and make them complex
always encrypt sensitive network traffic
5.4 WIRELESS NETWORK
types of wireless network
WLANS; wireless local area networks
WPANS;
wireless personal area networks
WMANS; wireless metropolitan area networks
WWANS; wireless wide area networks
types of wireless attacks
rogue wireless device
peer-to-peer networks
eavesdropping
encryption cracking
authentication attacks
wireless hijacking
secure a wireless communication
encryption
anti-virus and anti-spyware software and firewall
authentication
standard wireless
802.11aj
802.11ah
802.11ad
802.11ac
802.11n
802.11g
802.11a
802.11b
implement security policy on wireless network
statement of purpose and scope
procedure for adding new access point
access point placement
wireless network component
a wireless network is a computer network that uses wireless data connection between network nodes.
example of wireless network cell phone networks, wireless local area network, wireless sensor network, satellite communication networks and terrestrial microwave networks.
Client software and adapter
Access point
WLAN controllers
Power injector