Welcome

Anti Essays offers essay examples to help students with their essay writing.

Sign Up

Summary

Open Document

Below is a free excerpt of "Summary" from Anti Essays, your source for free research papers, essays, and term paper examples.

Video Summary 7
Steven Perry
NT1110
ITT- Technical Institute
Mr. Jason Tucker
February 23, 2013




Physical Security
• Lock and control access to servers
• Lock sever and computer cases
• Use audible alarms
• Create administrative supports
• Locate servers from high traffic area
• Store backup tapes in security area
• Lock users operating system
• Physically destroy old hard drives
Authentication Policies
• CMOS passwords
• Username and passwords
• Smart card and PIN
• Key fob
• Biometric
CMOS Passwords
Power On Passwords
• Supervisors Passwords
• User’s Password
• Full Access
• Limited Access
• View Only Access
• No Access
Hard Drives
• Protects DATA even if HD is stolen
Password required each time system boots

Reset CMOS Passwords
• Access CMOS settings
• Reset Jumper
• Remove/replace   CMOS battery

Create Strong Passwords
• Six or more characters
• Passphrase
• Upper and lowercase letters
• Mix in numbers and symbols
• Don’t Use
• Consecutive letter
• Consecutive numbers
• Consecutive keys
Kerberos
• Authentication method used by windows to encrypt passwords
• Passwords are case sensitive

Encryption Keys
• Traditional Encryption Methods
• Single Key

Modern Encryption Methods
• Public Key
 To encrypt
Private Key
 To decrypt

Private Key
• Who may decrypt and encrypted file
 Owner
 User with private key
 Recovery agent


How do you encrypt?
• File properties
• Advance Tab > Encrypt
• Command Line
 C:/cipher /e [filename]
Wireless Security
• Wireless Device Communicate
 Directly- Ad Hoc Mode
• Remember this term
• Through an access point (AP)
Wireless Access Point (WAP)
• Most networks use wireless   (AP)
• Creates Hotspots
Security Must be configured
SSID-Security Set Identifier
• Broadcast presence of WAP
• Disable SSID broadcasting to hide WAP
Filter MAC Addresses
• List Accepted MAC Addresses
• All others will be locked
SSID- Name and Password
• Default set...

Show More


Citations

MLA Citation

"Summary". Anti Essays. 14 Dec. 2018

<http://teachingsail.com/free-essays/Summary-411392.html>

APA Citation

Summary. Anti Essays. Retrieved December 14, 2018, from the World Wide Web: http://teachingsail.com/free-essays/Summary-411392.html


Main Computer Components - 386 Words | The Man in the High Castle | Baker Street Peculiars (001-004+TPB) (2016-2017) (digital) (Minutemen-...