Tuesday, October 15, 2019
Network security Essay Example | Topics and Well Written Essays - 500 words
Network security - Essay Example Technical security controls are made of three components: detective, corrective and preventive, which all work to mitigate risks within a system. The first step I will access the router through the web interface. This will allow me to configure encryption using the WPA2 or the pre-shared key. This will ensure that anyone who all devices must provide this key before joining the network. There are three IKE policy choices message encryption, message integrity hash algorithm and peer authentication method. The policies are satisfied by various encryption methods that are dependent on a number of factors such as type of hardware in place. The key length available when using encryption algorithm allows the definition of key length used in terms of bits. When it comes to choosing message encryption algorithm, 3des is the strongest when compared to DES. The sha encryption offers a better encryption type as compared to md5 when it comes to message integrity has algorithm. For the peer authentication method, the rsa-sig offers a stronger encryption. An intrusion detection system has powerful features that provide notification when an attack occurs. On the other hand, a detective prevention system only uses limited functions to thwart attacks from taking place. Detection system is also limited because it relies on copies of network packets, which must be received from another switch. This makes sensors operating in intrusion mode to be said as running in promiscuous mode. Compared to detection system, intrusion prevention is more robust and has better features because it operate in inline mode where it checks as packets flows in teatime. Therefore, it can prevent traffic from entering a given network in
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.