footer: Networked Systems Security slidenumbers: true autoscale: true build-lists: true
2. Security Systems
Know about security related hardware and software
- Email systems
- Security features eg secure MIME, spam, hoaxing, relay agents
- Wireless systems: security features eg site surveys, MAC association, WEP/WPA keys,TKIP
- Networked devices: security features eg router, switch, wireless access point
- Transmission media: issues eg use of shielding
- Personal access control: devices eg biometrics, passwords, usernames, permissions, digital signatures
- Security control at device level: access control eg protocols, log in, certificates
- Encryption: eg encrypting files for confidentiality, encryption with application-specific tools, recovering encrypted data
- Intrusion detection systems: devices eg firewalls, virus protection, spyware protection, file monitoring, folder monitoring, use of honeypots, alarms
Email Systems
- S/MIME (Secure/Multipurpose Internet Mail Extensions)
- SPAM (stupid pointless annoying messages)
Wireless Systems
- WEP/WPA Keys
- TKIP
3. WEP/WPA Keys
- WEP - Wired Equivalent Privacy
- WPA - Wireless Protected Access
- WPA2 Keys
- WPA2 Enterprise
WEP - Wired Equivalent Privacy
- 64bit / 128bit Key Size
WPA - Wireless Protected Access
- Encryption Algorithm
- RC4
- Protocol
- TKIP (Temporal Key Integrity Protocol)
- Every Packet gets a unique encryption key
WPA2
- Encryption Algorithm
- AES (Advanced Encryption Standard)
- Protocol
- CCMP (Counter Mode Cipher Block Chaining) Message Authentication Code Protocol
WPA2 Enterprise
- Supports user grouping
ENCRYPTION STANDARD | Protocol | Algorithm | Should you use it? |
---|---|---|---|
WEP | TKIP | RC4 | No |
WPA | TKIP | RC4 | Only if WPA2 is not available |
WPA2 | CCMP | AES | Yes |