Advertisement
Guest User

HELPMEJESUS

a guest
Aug 22nd, 2017
76
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.39 KB | None | 0 0
  1. Passwords:
  2. Network operating systems control, user logon and passwords to make the system secure. There should be a password requirement, typically: Eight characters, upper and lower case letters, including a number and a symbol such as a $ or similar.
  3.  
  4. User access levels:
  5. File access rights will allow user to read, write, execute or perform a combination of these functions. This is used to maintain the security and privacy of files.
  6.  
  7. Authentification:
  8. Authentification is the process of identifying and individual and is distinct from authorisation, for example a user can enter a username and passwords at a login screen and prove they know that piece of information but not that they have permission to log in. There are three broad types of authentication, something you…
  9. - … know (Password)
  10. - … have (smartcard)
  11. - … are (biometrics)
  12. Multi-factor or two factor, authentication is about using additional types of authentication to increase the difficulty for someone malicious to guess/steal the information/item
  13. Encryption:
  14. Encryption means to scramble data in such a way that only someone with the secret code or key can read it. For encryption algorithms, key specifies the transformation of plaintext into cipher text and read vice versa for decryption algorithms.
  15. How does it work?
  16. Encryption works by scrambling the original message with a very large digital number (key). This is done using advanced mathematics. Commercial-level encryption uses a 8 bit key that is very, very hard to crack. The computer receiving the message knows the digital key and so is able to work out the original message.
  17. Why is it important?
  18. Encryption is important as it enables you to pass a secret message from one palce to another without anyone else being able to read it.
  19. Where is it used?
  20. Web browsers are enable toe encrypt your purchase details using an encryption method called ssl.
  21. Built in encryption functionality of many office productivity applications (For example, MSO 2010 offers a strong algorithm for the protection of files.)
  22. Email encryption and authentication.
  23. Firewall:
  24. A firewall is a network security system, either hardware or software-based, that controls incomiong and outgoing network traffic based on a set of rules. Simply compared to a security guard who stands at the entrance of your house and filters the visitors coming toy our place. He may also allow some visitors to enter while denying others whom he suspects of being intruders.
  25. Who uses it?
  26. Members of the public
  27. Corporate organizations
  28. What systems use it?
  29. Windows/mac PC’s
  30. Network devices
  31. MAC address filtering:
  32. Media access control address filtering is the process of setting up parameters to allow only certain mac addresses onto a network or particular router (Access point). It is a very rudimentary protection method as it can be copied by someone else listening in to the connection (if wireless).
  33. What is it used for?
  34. This is to allow only certain mac addresses to connect to a network. It is basic security measure as the user should be the only person that knows what mac addresses are connected to it. However if someone is listening, they can determine what the address is through the packets of information and copy It onto their own devices.
  35. What type of programs/devices use it?
  36. The main type of device that would use this would be a router or any wireless acess point that can be configured with mac address filtering.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement