Network Security is very suitable for WiFi computers on the network to be something very important to you or organization of computer network security settings, this is because the methods currently used for the media to communicate between one piece of equipment with other equipment that uses the broadcast method. So it becomes a very important need for you to use this particular model of wireless networks with WiFi technology to find some models of network security is usually provided by the Access Point (AP) for your WiFi computer network security. Computer network security problem in principle can not be separated from the two basic points, namely the concept of authentication (access control) and encryption (data protection).
1. WEP (Wired Equivalent Privacy).
Wireless computer network security engineering is safety on the 802.11 standard. This technique will create a wireless network, will have security similar to what is in the cable network. WEP uses encryption system to protect wireless LAN users in the most basic level. WEP allows the administrator to make wireless network encription key that will be used to encrypt the data before the data is sent. Encryption keys are usually made from scratch and 64-bit key encryption combined with RC4 algorithm.
In principle there are two levels of WEP encryption, 64 bits and 128 bits. The higher bit encryption, the secure network, but the speed is lowered. To use WEP, you must select the desired bit encryption, and enter a passphrase or WEP key in hexadecimal form. WEP uses a sequence of hexadecimal values are derived from a passphrase encryption.
When the facility is WEP enabled, all wireless devices on the network must be configured using the same key. Access rights of a person or a device will be denied if the keys are not identical.
2. WPA (Wi-Fi Protected Access)
WPA is a wireless computer network security engineering LAN using better encryption techniques and security in the form of additional authentication of users. There are two models in this type of encryption, namely TKIP and AES. TKIP (Temporal Key Integrity Protocol) uses a more secure encryption method and also using the MIC (Message Integrity Code) to protect networks from attacks. While AES (Advanced Encryption System) uses 128 bit encryption of data blocks are symmetric.
3. MAC (Medium Access Control) Address Filtering.
Computer network security system is another wireless LAN is to use a MAC address filter that will select the access based on MAC address of the user. Usually there are two methods of wireless MAC Filter is: Prevent that serves to block access from a list of MAC addresses, and Permit Only which only allows access from the existing data on the list of MAC Address. With MAC address filtering security models, we need to first register the MAC address of each computer on the network is in a list of MAC addresses, in order to recognize and communicate using the facility.WiFi computer network security to be something very important to you or the organization of the computer network's security settings, this is because the current methods used for the media to communicate between one piece of equipment with other equipment that use the broadcast method. So it becomes a very important need for you to use this particular model of wireless networks with WiFi technology to find some models of network security is usually provided by the Access Point (AP) for your WiFi computer network security. Computer network security problem in principle can not be separated from the two basic points, namely the concept of authentication (access control) and encryption (data protection).
Very informative post. Keep up the good work. I would really look forward to your other posts
ReplyDeleteDell - Geek Squad Certified Refurbished Inspiron 15.6" Laptop - 4GB Memory - 500GB Hard Drive - Black
Dell - Inspiron 17.3" Laptop - 4GB Memory - 500GB Hard Drive - Black