3.1C Methods of Network Security Flashcards
Use a password to access your device
Pros:
–> High speeds
Cons:
–> Anyone can access the network
Install an antivirus program on your device
Pros:
–> very protection from malicious software
Cons:
–> May slow down you device
Use a software firewall installed on each device
Pros:
–> Monitors and controls the traffic flow between your computer and the network
–> Prevents unauthorized access to your device
Cons:
–> May slow down your device
Use a password to access the web interface that is used to set up your wireless routers or access point
Pros:
–> If someone enters the Ip address of the router they need a password
Cons:
–> Takes some time to enter the user name and password (weak passwords –> easy to crack)
Turn On/Off Wireless Connectivity
Pros:
–> Complete Security
Cons:
–> If the wireless is disabled then there is no wireless network
Enable/Disable SSID Broadcast
Pros:
–> Invisible to novice users
Cons:
–> Experienced attackers can easily find your SSID
Limit access to wireless devices by MAC address
Pros:
–> Extra Security
Cons:
–> Difficult to manage the list
–> MAC addresses easily discovered
WEP Wireless Security
Pros:
–> Works with “legacy” systems
Cons:
–> Outdated
WPA, WPA2 Wireless Security
Pros:
–>The best option - Strong Encryption
Wireless Protected Setput (WPS)
Pros:
–> Ease of use
–> No need to know SSID
Cons:
–> New technology
–> Works only with WPS-certified devices
Prevent Physical Acess (Wireless Network)
Pros:
–> limited to the interior of the user’s premises
Cons:
–> Very Expensive
Router Hardware Firewall
Pros:
–> Prevents Hackers and unauthorized persons on the internet from getting access to your network
Cons:
–> Can’t stop people in a range of your WiFi from getting onto your WiFi network.
Use Encryption Software
Pros:
–> Extremely difficult for an unauthorized person to read your sensitive files
Cons:
–> Process takes time