b. Network security is challenging as the methods of attacking are getting better every year. Information is gathered easily from the packets if there is no SSL connection available with the search engine
c. An example is allowing cell phones into the corporate network totally bypassing the access control strategies, firewalls, antivirus protection, data loss and prevention systems
d. In the castle model there is only one protected single point of entry. This is the way cyber security has been carried out throughout the past 20 …show more content…
This is an expression used by network administrators to convey the thought that making 100 percent network is not possible.
f. Securing a city is more complex that a castles as there is more to secure within the confinements of that city. This means that there is a need for interruption detection, virtual LAN’s, central authentication and encrypted internal traffic.
6. Chapter 4 Test Your Understanding – 11 a, b and c
a. 802.11x is a port based access control because the computer is connected to the port through UTP or directly to switch. The port is real access point control. 802.11X provides access trying to prevent unauthorized client from intruding the network.
b. When a computer is connected to any port it will not be recognized by network since it is not authenticated. After is authenticates itself all the communication in the network will traverse through it. The computer can access the network after the authentication is successful.
c. In large companies it becomes a task to authenticate every single system since it involves many workgroup switches. Having a centralized authenticating server reduces the cost by simplifying heavy authenticating