Saturday, October 19, 2019
Detecting rogue access point using Omnipeek software to analyze the Essay
Detecting rogue access point using Omnipeek software to analyze the wireless network - Essay Example The Open Systems Interconnect reference model formulated by the International Standards Organization (ISO), defines at least seven layers to enable communication through the network. These layers are the physical layer, the data link layer, the network layer, the transport layer the session layer. According to peter and scarfone (2007), the TCP/IP layer provides network communication and is made up of four main layers. These are the 2.0.2 Transport layer: Provides connectionless services and connection oriented services between various elements. It ensures reliability of communication and uses Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).2.0.3 Internet Protocol layer (IP): this layer routes packets across the network. The IPv4 is the fundamental network protocol for TCP/IP layer. Other commonly used protocols are the Internet Group Management Protocol (IGMP) and the Internet Control Message Protocol (ICMP).The four main layers inter-work to transfer informatio n between the hosts. The information is passed from the highest layer to the lowest layer with each layer adding more information. The lowest layer sends the information through the physical network the information is then passed upwards to its destination.Network security encompasses the various provisions made to a computer network infrastructure and the policies adopted by the network system administrator to protect the network and the resources accessed through that network (Nazario, 2003). Various network security systems are in use. ... Other commonly used protocols are the Internet Group Management Protocol (IGMP) and the Internet Control Message Protocol (ICMP). 2.0.4 Hardware layer; also known as the data link layer and handles communication on the physical network component. The Ethernet is the best known protocol. The four main layers inter-work to transfer information between the hosts. The information is passed from the highest layer to the lowest layer with each layer adding more information. The lowest layer sends the information through the physical network the information is then passed upwards to its destination. Network security encompasses the various provisions made to a computer network infrastructure and the policies adopted by the network system administrator to protect the network and the resources accessed through that network (Nazario, 2003). Various network security systems are in use. The simplest involves one factor authentication through the use of the username and password, two factor authentications by using an ATM card or a mobile phone or three factor authentication using fingerprint or retinal scan. The intrusion prevention systems detect and inhibit any attacks posed by malwares, Trojans and worms (Simmonds et al, 2004). The intrusion detection systems on the other hand detect threats and inform the system administrator. As stated by Crothers (2002), the main methods used to detect the attacks on network systems are; Signature based detection Anomaly based detection State full protocol analysisDifferent network systems have different network security technologies. The different network security technologies can be classified into four major groups. These are; Network based intrusion detection and prevention system (IDPS): monitors
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment