footer: Networked Systems Security slidenumbers: true autoscale: true build-lists: true

2. Security Systems

Know about security related hardware and software

  1. Email systems
    • Security features eg secure MIME, spam, hoaxing, relay agents
  2. Wireless systems: security features eg site surveys, MAC association, WEP/WPA keys,TKIP
  3. Networked devices: security features eg router, switch, wireless access point
  4. Transmission media: issues eg use of shielding
  5. Personal access control: devices eg biometrics, passwords, usernames, permissions, digital signatures
  6. Security control at device level: access control eg protocols, log in, certificates
  7. Encryption: eg encrypting files for confidentiality, encryption with application-specific tools, recovering encrypted data
  8. Intrusion detection systems: devices eg firewalls, virus protection, spyware protection, file monitoring, folder monitoring, use of honeypots, alarms

Email Systems


Wireless Systems


3. WEP/WPA Keys


WEP - Wired Equivalent Privacy

WPA - Wireless Protected Access

WPA2

WPA2 Enterprise


ENCRYPTION STANDARD Protocol Algorithm Should you use it?
WEP TKIP RC4 No
WPA TKIP RC4 Only if WPA2 is not available
WPA2 CCMP AES Yes

External Links

Host Based IDS