What is a WEP Key? WEP, which stands for Wired Equivalent Privacy, is a security algorithm used for IEEE 802.11 wireless routers. One of the problems that comes with using a wireless router is that you are transmitting your data by using waves rather than through wires. This means that the data can be picked up by another computer which is something known as eavesdropping. To prevent against this, WEP was implemented in 1997 to prevent this data from being intercepted and analyzed. WEP has since been replaced by WAP Read More
Identity Management
Identity management is a discipline which encompasses all of the tasks required to create, manage, and delete user identities in a computing environment. Identity Management is often abbreviated IdM. Identity Management Tasks During Account Provisioning Identity management begins with the creation of the user account and the assignment of appropriate attributes to the account. The user account is then provisioned into all of the systems to which that user is to be given access. Identity Management Tasks During the Account Lifetime Identity management tasks during the lifetime of the user Read More
Denial of Service (DoS) Attacks
A Denial of Service (DoS) attack is one that attempts to prevent the victim from being able to use all or part of his/her network connection. A denial of service attack may target a user to prevent him/her from making outgoing connections on the network. It may also target an entire organization to either prevent outgoing traffic or to prevent incoming traffic to certain network services, such as the organizations web page. Denial of service attacks are much easier to accomplish than remotely gaining administrative access to a target system. Read More
How to Disable the XP Firewall
The firewall application built into Microsoft Windows XP protects your computer from many unpleasant network attacks. Unfortunately, the XP firewall also occasionally causes a legitimate application to fail. It is sometimes necessary to disable the Windows XP firewall in order to enable these applications to work. Steps to Disable the Windows XP firewall Click the button. Highlight . Click . Click . Check the circle beside . Click the button.
How to Configure Wireless Security
Wireless security is used to limit the scope of users that have access to services you install when implementing a wireless access point or wireless router device. These devices are used to provide convenient intranet and/or Internet access without having to run cable through buildings or other areas of coverage where return on investment is low. There are two methods used with wireless systems today to limit access: Coverage Area Authentication and Authorization Mechanisms Coverage Area You can limit coverage area with an access point by using the proper antenna Read More
Two Factor Authentication
Two factor authentication is term used to describe any authentication mechanism where more than one thing is required to authentate a user. The two components of two factor authentication are: Something you know Something you have Traditional authentication schemes used username and password pairs to authenticate users. This provides minimal security, because many user passwords are very easy to guess. In two factor authentication, the password still provides the something you know component. In the most common implementations of two factor authentication, the something you have component is provided by Read More
Access Control
Access control is the execution of limitations and restrictions on whoever tries to occupy a certain protected property, thereby keeping people as safe as possible. As modern society moves further into the cyber age, these access control systems become almost completely computer controlled. This article will further explain what access control is, how it works, and will list the different types. What is Access Control? Access control is the term used to describe how a person, mechanical device, or computer system uses both physical barriers and alarms to keep an Read More
Honeypot
A honeypot is a trap that's used to identify, avert and, to some extent, neutralize attempts to hijack information systems and networks. It is usually made up of a single computer or a network site that disguises itself as a normal computer or network. It can also morph to look like an unused IP address, a file or a record. It tempts hackers by pretending to contain data that cyber criminals often deem important. It can deceive the hacker into thinking that it is an open proxy. A honeypot is Read More
Share on: