M2 Suggest how users can be authenticated to gain access to a networked system
Users can be authenticated to gain access to a networked system by identify, authentication
and authorisation. Firstly, the user must identify themselves by proving who they claim to be
and it is called identification. Next, the user must have any necessary credentials or given a
necessary privileges or rights to perform a request for someone else and it is called
authentication. Lastly, when identification and authentication is completed the user can
access to the network resources which is called authorisation.
Wireless systems:
The network can be protected through wireless systems. The security features that protects
the wireless system is MAC association, WEP key and WPA key.
MAC (Media Access Control)
Media Access Control association is a method of protecting
network. User will set up MAC association by providing
dynamic host configuration protocol server with a list of
computers MAC address that users wants to be able to access
the network. It means that only computers that are given
MAC address are able to access the internet or network. MAC
address identify network interface controller for network
address within a network segment and users cannot change
the MAC address. That means it would make difficult for the
attacker to get access to the network.
WEP (Wired Equivalent Privacy)
Wired Equivalent Privacy key is widely used Wi-Fi security
in the world. It is specified in the institute of electrical
and electronics engineers Wi-Fi 802.11 standard, that is
designed to provide WLAN with level of privacy
compared to wired LAN. Wireless network uses radio
waves that allows attackers to gain access to the user’s
network. WEP is weak so attackers can easily encrypt the
network.
WPA (Wi-Fi Protected Access)
Wi-Fi Protected Access is a security protocol that is designed to
create secure network, it is similar to WEP but offers
improvements that handles security keys and ways users
authorized. For encrypted data, users must begin and end data
transfers with the same encryption key. WEP provides same key
for the authorized system whereas WPA uses TKIP which
dynamically change the system use. It prevents attackers from
creating their own encryption key to match the network.
Users can be authenticated to gain access to a networked system by identify, authentication
and authorisation. Firstly, the user must identify themselves by proving who they claim to be
and it is called identification. Next, the user must have any necessary credentials or given a
necessary privileges or rights to perform a request for someone else and it is called
authentication. Lastly, when identification and authentication is completed the user can
access to the network resources which is called authorisation.
Wireless systems:
The network can be protected through wireless systems. The security features that protects
the wireless system is MAC association, WEP key and WPA key.
MAC (Media Access Control)
Media Access Control association is a method of protecting
network. User will set up MAC association by providing
dynamic host configuration protocol server with a list of
computers MAC address that users wants to be able to access
the network. It means that only computers that are given
MAC address are able to access the internet or network. MAC
address identify network interface controller for network
address within a network segment and users cannot change
the MAC address. That means it would make difficult for the
attacker to get access to the network.
WEP (Wired Equivalent Privacy)
Wired Equivalent Privacy key is widely used Wi-Fi security
in the world. It is specified in the institute of electrical
and electronics engineers Wi-Fi 802.11 standard, that is
designed to provide WLAN with level of privacy
compared to wired LAN. Wireless network uses radio
waves that allows attackers to gain access to the user’s
network. WEP is weak so attackers can easily encrypt the
network.
WPA (Wi-Fi Protected Access)
Wi-Fi Protected Access is a security protocol that is designed to
create secure network, it is similar to WEP but offers
improvements that handles security keys and ways users
authorized. For encrypted data, users must begin and end data
transfers with the same encryption key. WEP provides same key
for the authorized system whereas WPA uses TKIP which
dynamically change the system use. It prevents attackers from
creating their own encryption key to match the network.