Computer Hardware and Software

1472 words 6 pages
Identify hardware and software needed to secure your choice of networks against all electronic threats.
Networking hardware is hardware that is used to help work stations connect to a server. Although there are many different kinds of hardware like bridges, network cards the networking hardware that I have chosen to use in within my company’s network are routers, firewalls and switches. Using both routers and firewalls will help protect not only wireless networks but also those networks that use Ethernet cabling. I chose this hardware because I felt that it’s the best hardware to use when keeping my company’s network safe. The software that I have chosen to use is McAfee Anti-virus security software. This software along with the
…show more content…
WLAN runs on IEEE 802.11x standards “ (The standards 802.11b, 802.11a, and 802.11g are the most commonly used today)p.644 ”, Wi-Fi ( Wireless Fidelity), WLAN security, Voice over WLAN, and Mesh networks. Wi-Fi connection is shared amongst many people in buildings, parks, restaurants, hospitals and other spots within the neighborhood. This network can be used for no cost at accessibility is free. The service is not the best for video and voice communication and may cause delays, higher security threats, and limited service range when it comes to Wi-Fi connections. When it comes to WLAN security there is WEP, WPA, and WPA2. WEP comes in both Static and Dynamic. The static web has a 24 bit starting point and usually results in 64 or 128bits and is supported all current VoWLAN and The Dynamic uses the authentication within the 802.1x standards. The current standards when it comes to WLAN security is the WPA. The three main elements of WPA are:
“Temporal Key Integrity Protocol (TKIP)—TKIP, based on RC4 encryption, uses a 304-bit key (a 128-bit base key plus a 128-bit IV plus the 48-bit MAC address) and generates new encryption keys after various configurable intervals (a time period, a bit quantity, or even every frame), which makes it much more difficult to break.
■ Message Integrity Code (MIC)—MIC introduces a kind of digital signature to each frame to ensure that messages are not tampered with or captured and replayed. It helps to


  • Keystone Computer Case
    3148 words | 13 pages
  • Computers and Digital Baasics
    3138 words | 13 pages
  • Computer Industry Analysis
    4078 words | 17 pages
  • Market Analysis for Product Software
    1263 words | 6 pages
  • Computer and Points Question
    1385 words | 6 pages
  • Determining Operating Systems and Software Applications
    1293 words | 6 pages
  • Computer Information Systems Brief
    1186 words | 5 pages
  • Software Piracy
    2175 words | 9 pages
  • Software Defined Networks
    4064 words | 17 pages
  • Case Analysis 1: Apple Computer
    2491 words | 10 pages