Preview

Nt1310 Unit 5 Security Protection

Good Essays
Open Document
Open Document
572 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 5 Security Protection
|Security Protection |Brief Description |Vulnerabilities |Prevention |
|MAC address filtering |refers to a security access |While the restriction of network access|While giving a wireless |
| |control method whereby the |through the use of lists is |network some additional |
| |48-bit address assigned to each |straightforward, an individual person |protection, MAC filtering can |
| |network card is used to |is not identified by a MAC address, |be circumvented by scanning a |
|
…show more content…
This|
| | |would use to access the network. |can be done in the Windows |
| | | |Registry or by using |
| | | |commandline tools on a Linux |
| | | |platform.
…show more content…
However, |Equivalent Privacy) protocol |
| |standard. It consists of a |the easy availability of inexpensive |to provide better |
| |simple authentication request |equipment also gives attackers the |communication security, |
| |containing the station ID and an|tools to launch attacks on the network.|however it is important to |
| |authentication response |The design flaws in the security |note that the authentication |
| |containing success or failure |mechanisms of the 802.11 standard also |management frames are still |
| |data. |give rise to a number of potential |sent in clear text during |
| | |attacks, both passive and active. These|authentication process. WEP

You May Also Find These Documents Helpful