CHAPTER 3 SECURITY TECHNIQUE AND MAINTENANCE (Common Communication…
SECURITY TECHNIQUE AND MAINTENANCE
Common Communication Encryption Types
Hash encoding, or hashing, ensures that messages are not corrupted or tampered with during transmission.
However, the function is one way. Knowing the message digest does not allow an attacker to recreate the message, making it difficult for someone to intercept and change messages.
Requires both sides of an encrypted conversation to use an encryption key to encode and decode the data.
The sender and receiver must use identical keys.
Example : DES and 3DES
Requires two keys, a private key and a public key.
The public key can be widely distributed, including emailing in clear text or posting on the web.
The private key is kept by an individual and must not be disclosed to any other party. These keys can be used in two ways.
Service Set Identifier(SSID)
The Service Set Identifier (SSID) is the name of the wireless network. A wireless router or access point broadcasts the SSID by default so that wireless devices can detect the wireless network.
To disable SSID broadcasting, use the following path:
Wireless > Basic Wireless Settings > select Disabled for SSID Broadcast > Save Settings > Continue
MAC Address Filtering
MAC address filtering is a technique used to deploy device-level security on a wireless LAN.
Because every wireless device has a unique MAC address, wireless routers and access points can prevent wireless devices from connecting to the network if the devices do not have authorized MAC addresses.
To enforce MAC address filtering, enter the MAC address of each wireless device.
Configure Wireless Security Modes
Wireless Security Modes
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access 2 (WPA2)
Wi-Fi Protected Access (WPA)
Avoid transmitting signals outside of the network area by installing an antenna with a pattern that serves your network users.
A hardware firewall is a physical filtering component that inspects data packets from the network before they reach computers and other devices on a network.
The firewall can be configured to block multiple individual ports, a range of ports, or even traffic specific to an application.
A hardware firewall passes two different types of traffic into your network:
Responses to traffic that originates from inside your network
Traffic destined for a port that you have intentionally left open