IT530 Assignment-Unit 6 Essay

1949 Words Apr 2nd, 2014 8 Pages
Running head: IT530 ASSIGNMENT UNIT 6

IT530 Assignment-Unit 6
No Name
Kaplan University
Prof: Jeffrey Robinson

IT530 Assignment-Unit 6
Wireless Security
The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security
…show more content…
Network Security Protocols
Uses algorithms for encrypting data to ensure it is not readable by unauthorized users Wang, S. (2010).
FTP (File Transfer Protocol)
This method is used to transfer files, but it is sent in cleartext and is not encrypted.
STP (Secure File Transfer Protocol)
Sent through Secure Shell (SSH) encrypts the commands and data transfers over the network.
SSL/TLS (secure Sockets Layer/Transport Layer Security)
The underlying protocol for SSH (Secure Shell Protocol) and it is a cryptographic network protocol for remote command login, it provides a secure data communication over the networks Wang, S. (2010). SSH/TLS authenticates the identification of the server and the client. It produces encryption communication between the browser and the web server, such as HTTP.
VPN (Virtual Private Networks)
Protocols such as Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), IP Security (IPsec), and SSH (Secured Shell) help to secure communication remotely for users and organizations anywhere and provide a safe connection with cost reduction.
Table by Karen Ruffin Johnson

Basic Network Protocols
The main communication protocol for the internet protocol, it is the networking model known as TCP/IP TCP/IP Networking Protocol (n.d.). This protocol falls under Packaging and Low

Related Documents