Standard: Security Methods Jason Gibson TCM471 Professor Crum
Introduction The Need for Security in Business
Vulnerabilities New Transmission Environment Hackers Eavesdropping and Masquerading Denial of Service Internal Threats Ad Hoc Networks Rogue Networks
Firewalls Filters to Outside Networks Proxies Stateful Inspection Satisfactory for Small Networks
Wired Equivalency Protocol (WEP) Authentication Open Network Shared Key System Most Common Encryption Random Number Generator
Security Measures Access Point Security Vulnerability Assessment Encryption, Authentication and Wireless VPNs Policy Enforcement Intrusion Detection Systems
AirDefense Intrusion Detection System Detect LAN Vulnerabilities Intruder Detection and Response Security Policy Enforcement
Recommended Standard: G Scheduled Approval, May 2003 Support High Data Rates like a - 54 Mbps - 54 Mbps Operates at 2.4 GHz like b Backward Compatibility
Future of d e f h i RADIUS
Conclusion
Questions?