.

Wednesday, April 17, 2019

Network security Essay Example | Topics and Well Written Essays - 500 words

Network security - Essay lawsuitTechnical security controls are made of three components detective, corrective and preventive, which all work to mitigate risks inwardly a system.The first step I will access the router through the web interface. This will get out me to configure encryption using the WPA2 or the pre-shared delineate. This will ensure that anyone who all devices must provide this key before joining the network.There are three IKE policy choices message encryption, message equity chop up algorithm and peer authentication method. The policies are satisfied by various encryption methods that are qualified on a number of factors such as type of hardware in place. The key continuance available when using encryption algorithm allows the definition of key length used in monetary value of bits. When it comes to choosing message encryption algorithm, 3des is the strongest when compared to DES. The sha encryption offers a better encryption type as compared to md5 when it comes to message integrity has algorithm. For the peer authentication method, the rsa-sig offers a stronger encryption.An intrusion detection system has powerful features that provide notification when an flack catcher occurs. On the other hand, a detective prevention system only uses limited functions to thwart attacks from winning place.Detection system is also limited because it relies on copies of network packets, which must be received from other switch. This makes sensors operating in intrusion mode to be said as running in faint mode.Compared to detection system, intrusion prevention is more robust and has better features because it operate in inline mode where it checks as packets flows in teatime. Therefore, it can prevent traffic from entering a given network in

No comments:

Post a Comment