m2 suggest how users can be authenticated to gain access to a networked system
Written for
BTEC
PEARSON (PEARSON)
Computer Science
Unit 32: Networked Systems Security
All documents for this subject (7)
Seller
Follow
jessykaur
Reviews received
Content preview
M2 Suggest how users can be authenticated to gain access to a networked system
Users can be authenticated to gain access to a networked system by identify, authentication
and authorisation. Firstly, the user must identify themselves by proving who they claim to be
and it is called identification. Next, the user must have any necessary credentials or given a
necessary privileges or rights to perform a request for someone else and it is called
authentication. Lastly, when identification and authentication is completed the user can
access to the network resources which is called authorisation.
Wireless systems:
The network can be protected through wireless systems. The security features that protects
the wireless system is MAC association, WEP key and WPA key.
MAC (Media Access Control)
Media Access Control association is a method of protecting
network. User will set up MAC association by providing
dynamic host configuration protocol server with a list of
computers MAC address that users wants to be able to access
the network. It means that only computers that are given
MAC address are able to access the internet or network. MAC
address identify network interface controller for network
address within a network segment and users cannot change
the MAC address. That means it would make difficult for the
attacker to get access to the network.
WEP (Wired Equivalent Privacy)
Wired Equivalent Privacy key is widely used Wi-Fi security
in the world. It is specified in the institute of electrical
and electronics engineers Wi-Fi 802.11 standard, that is
designed to provide WLAN with level of privacy
compared to wired LAN. Wireless network uses radio
waves that allows attackers to gain access to the user’s
network. WEP is weak so attackers can easily encrypt the
network.
WPA (Wi-Fi Protected Access)
Wi-Fi Protected Access is a security protocol that is designed to
create secure network, it is similar to WEP but offers
improvements that handles security keys and ways users
authorized. For encrypted data, users must begin and end data
transfers with the same encryption key. WEP provides same key
for the authorized system whereas WPA uses TKIP which
dynamically change the system use. It prevents attackers from
creating their own encryption key to match the network.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller jessykaur. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $5.15. You're not tied to anything after your purchase.