Chapter 3 : Security Technique And Maintanance

Get Started. It's Free
or sign up with your email address
Rocket clouds
Chapter 3 : Security Technique And Maintanance by Mind Map: Chapter 3 : Security Technique And Maintanance

1. Hash Encoding

1.1. Hash encoding, or hashing, ensures that messages are not corrupted or tampered with during transmission.

2. Symmetric Encryption

2.1. Requires both sides of an encrypted conversation to use an encryption key to encode and decode the data.

3. Asymmetric Encryption

3.1. Public key encryption is used when a single organization needs to receive encrypted text from a number of sources. The public key can be widely distributed and used to encrypt the messages. The intended recipient is the only party to have the private key, which is used to decrypt the messages.

3.2. https://cdn.pixelprivacy.com/wp-content/uploads/2018/04/private-key-and-a-public-key-in-asymmetric-encryption-1.png

4. Wireless Access

4.1. Wireless Security Modes

4.1.1. Wired Equivalent Privacy (WEP) - The first generation security standard for wireless. Attackers quickly discovered that WEP encryption was easy to break. Wi-Fi Protected Access (WPA) - An improved version of WEP, WPA covers the entire 802.11i standard. WPA uses much stronger encryption than WEP encryption. Wi-Fi Protected Access 2 (WPA2) - An improved version of WPA. This protocol introduces higher levels of security than WPA. WPA2 supports robust encryption, providing government-grade security.

5. Firewall

5.1. https://image.slidesharecdn.com/1-090911124437-phpapp01/95/firewall-4-728.jpg?cb=1252673121

5.2. Hardware Firewall A hardware firewall is a physical filtering component that inspects data packets from the network before they reach computers and other devices on a network.

6. Physical Equipment Protection Methods

6.1. Disabling AutoRun

6.1.1. By disabling the AutoRun feature on Windows XP, a user can minimize the security risk from a malicious program running automatically when new media is connected to the computer.

6.2. Two-factor Authentication

6.2.1. Computer equipment and data can be secured using overlapping protection techniques to prevent unauthorized access to sensitive data.

7. The Right Security Mix

7.1. A computer in a busy public place, such as a library, requires additional protection from theft and vandalism.

7.2. In a busy call center, a server may need to be secured in a locked equipment room.

8. Security Maintenance

8.1. Service Packs and Security Patches

8.1.1. Patches are code updates that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack