preview

Nt1310 Unit 1 Case Study

Decent Essays

1) Distinguish between EAP, TACACS+, and RADIUS in terms of functionality.
EAP (Extensible Authentication Protocol) is an authentication technique that uses public and private key pairs created and implemented for authentication.

TACACS+ (Terminal Access Controller Access-Control System), it uses TCP Protocol and Port 49. Also it encrypts the entire payload and separates Authentication & Authorization.

RADIUS (Remote Access Dial-In User Service) uses UDP Protocol and Port(s), of 1812 & 1813 -or- UDP: 1645 & 1646. However, it encrypts only the Password Field and combines Authentication and Authorization ("TACACS+ and RADIUS Comparison," 2008).

2) What wireless LAN security threats do 802.11i and WPA not address?
802.11i, which you might …show more content…

Malware consists of viruses which are programs that attach themselves to legitimate programs on a victim’s machine. Worms are standalone programs that do not attach themselves to other programs. Direct propagation words take advantage of vulnerabilities in software. Blended threats propagate both as viruses and worms however; they post themselves on websites for people to download unwillingly. The payrolls are being nine they merely pop up Ace message on the victims computer screen or do something unknowing but nonlethal damage. Trojan horses, hides itself by deleting a system file and taking on the system file name. Remote access Trojan gives the attacker remote control of your computer. These items mentioned above do not rename themselves they can cause great damage or be just a nuisance.

6) How does the use of border, internal, and host firewalls provide defense in depth?

Border Firewall, stops simple high-volume attacks and insureds that responses to external scanning probes cannot reach an external attacker. Internal Firewall, controls traffic flowing between different parts of the firms internal network. Host Firewall, generally need to allow external access on TCP ports 80 (HTTP) and 443 (HTTP over SSL/TLS).
By using the border, internal and host firewalls, this is what creates defense in depth. Because an attacker must defeat all of these devices in order to get into a company’s network to cause great damage (Boyle & Panko, 2015, pp.

Get Access