Wednesday, May 8, 2019

Detecting rogue access point using Omnipeek software to analyze the Essay

Detecting rogue access propose use Omnipeek softw atomic number 18 to analyze the wireless meshing - Essay ExampleThe Open Systems Interconnect write model formulated by the International Standards Organization (ISO), defines at least seven works to enable converse through the electronic network. These layers atomic number 18 the physical layer, the data plug into layer, the network layer, the transport layer the session layer. harmonise to peter and scarfone (2007), the TCP/IP layer provides network communication and is made up of four of import layers. These are the 2.0.2 Transport layer Provides connectionless services and connection oriented services between various elements. It ensures dependability of communication and uses Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).2.0.3 earnings Protocol layer (IP) this layer routes packets across the network. The IPv4 is the fundamental network protocol for TCP/IP layer. Other commonly used protocols are the Internet Group Management Protocol (IGMP) and the Internet Control Message Protocol (ICMP).The four main layers inter-work to withdraw information between the hosts. The information is passed from the highest layer to the terminal layer with each layer adding more than information. The lowest layer sends the information through the physical network the information is then passed upwards to its destination.Network certificate encompasses the various provisions made to a computer network infrastructure and the policies adopted by the network system administrator to protect the network and the resources accessed through that network (Nazario, 2003). Various network security department systems are in use. ... Other commonly used protocols are the Internet Group Management Protocol (IGMP) and the Internet Control Message Protocol (ICMP). 2.0.4 Hardware layer also known as the data link layer and handles communication on the physical network component. The Ethernet is the best known protocol. The four main layers inter-work to transfer information between the hosts. The information is passed from the highest layer to the lowest layer with each layer adding more information. The lowest layer sends the information through the physical network the information is then passed upwards to its destination.Network security encompasses the various provisions made to a computer network infrastructure and the policies adopted by the network system administrator to protect the network and the resources accessed through that network (Nazario, 2003). Various network security systems are in use. The simplest involves one factor corroboration through the use of the username and password, two factor authentications by using an ATM card or a mobile phone or three factor authentication using fingerprint or retinal scan. The intrusion prevention systems detect and inhibit any attacks present by malwares, Trojans and worms (Simmonds et al, 2004). The intrusion detection syst ems on the other hand detect threats and inform the system administrator. As stated by Crothers (2002), the main methods used to detect the attacks on network systems are Signature base detection Anomaly based detection State full protocol analysisDifferent network systems have assorted network security technologies. The different network security technologies can be classified into four major(ip) groups. These are Network based intrusion detection and prevention system (IDPS) monitors

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.