Computer Hardware and Software

1472 words 6 pages
Identify hardware and software needed to secure your choice of networks against all electronic threats.
Networking hardware is hardware that is used to help work stations connect to a server. Although there are many different kinds of hardware like bridges, network cards the networking hardware that I have chosen to use in within my company’s network are routers, firewalls and switches. Using both routers and firewalls will help protect not only wireless networks but also those networks that use Ethernet cabling. I chose this hardware because I felt that it’s the best hardware to use when keeping my company’s network safe. The software that I have chosen to use is McAfee Anti-virus security software. This software along with the
…show more content…

WLAN runs on IEEE 802.11x standards “ (The standards 802.11b, 802.11a, and 802.11g are the most commonly used today)p.644 ”, Wi-Fi ( Wireless Fidelity), WLAN security, Voice over WLAN, and Mesh networks. Wi-Fi connection is shared amongst many people in buildings, parks, restaurants, hospitals and other spots within the neighborhood. This network can be used for no cost at accessibility is free. The service is not the best for video and voice communication and may cause delays, higher security threats, and limited service range when it comes to Wi-Fi connections. When it comes to WLAN security there is WEP, WPA, and WPA2. WEP comes in both Static and Dynamic. The static web has a 24 bit starting point and usually results in 64 or 128bits and is supported all current VoWLAN and The Dynamic uses the authentication within the 802.1x standards. The current standards when it comes to WLAN security is the WPA. The three main elements of WPA are:
“Temporal Key Integrity Protocol (TKIP)—TKIP, based on RC4 encryption, uses a 304-bit key (a 128-bit base key plus a 128-bit IV plus the 48-bit MAC address) and generates new encryption keys after various configurable intervals (a time period, a bit quantity, or even every frame), which makes it much more difficult to break.
■ Message Integrity Code (MIC)—MIC introduces a kind of digital signature to each frame to ensure that messages are not tampered with or captured and replayed. It helps to

Related

  • Amg/Forsythe: Lease vs. Buy
    1613 words | 7 pages
  • Computer and Points Question
    1385 words | 6 pages
  • Corporate Responsibility to protect the environment
    3517 words | 15 pages
  • Determining Operating Systems and Software Applications
    1293 words | 6 pages
  • Case Study Part 1 MS Word
    2019 words | 9 pages
  • Computer Industry Analysis
    4078 words | 17 pages
  • Mcts Guide to Microsoft Windows 7 Chapter 1 Solutions
    1523 words | 7 pages
  • Layering & Internet Model
    3141 words | 13 pages
  • Nerd Patrol
    3245 words | 13 pages
  • Access Control FInal Project
    1198 words | 5 pages