Appendix G Essay

Free Human Computer Interaction Individual Report Essay Sample

A+

WE WILL WRITE A CUSTOM ESSAY SAMPLE ON ANY TOPIC SPECIFICALLY

FOR YOU for only $24.38 $20.00/page

Custom Student Mr.Teacher ENG1001-04 November 6, 2017

Appendix G

Matrix Complete the following matrix by filling in the blank boxes in the table. Security protection Brief description Vulnerabilities Prevention (if any) MAC address filtering Allow or deny access traffic from Mac addresses Allowed client station addresses can be spoofed by any old hacker. This method is unreliable at best None really Open system authentication (SAID beaconing) Cloak the said so that no one will pick up your network while they are scanning.

Basically implements a closed network Mixed vendor incompatibilities, sometimes configured skids, 2 layer wireless protocol analyzers can lead to a revealing of the said As above none effective enough to mention WEEP Standard wireless network security that runs on matching weep keys for example. Transmissions are also encrypted ahead of time as privacy Is priority here. These days there exist tools that can crack this open In about 5 minutes rendering It less than efficient. They use a combination of weak key, reinsertion and bit flipping attacks Camp encryption and tack are recommended In this situation