490 Words2 Pages
Video Summary 7 Steven Perry NT1110 ITT- Technical Institute Mr. Jason Tucker February 23, 2013 Physical Security • Lock and control access to servers • Lock sever and computer cases • Use audible alarms • Create administrative supports • Locate servers from high traffic area • Store backup tapes in security area • Lock users operating system • Physically destroy old hard drives Authentication Policies • CMOS passwords • Username and passwords • Smart card and PIN • Key fob • Biometric CMOS Passwords Power On Passwords • Supervisors Passwords • User’s Password • Full Access • Limited Access • View Only Access • No Access Hard Drives • Protects DATA even if HD is stolen Password required each time system boots Reset CMOS Passwords • Access CMOS settings • Reset Jumper • Remove/replace CMOS battery Create Strong Passwords • Six or more characters • Passphrase • Upper and lowercase letters • Mix in numbers and symbols • Don’t Use • Consecutive letter • Consecutive numbers • Consecutive keys Kerberos • Authentication method used by windows to encrypt passwords • Passwords are case sensitive Encryption Keys • Traditional Encryption Methods • Single Key Modern Encryption Methods • Public Key  To encrypt Private Key  To decrypt Private Key • Who may decrypt and encrypted file  Owner  User with private key  Recovery agent How do you encrypt? • File properties • Advance Tab > Encrypt • Command Line  C:/cipher /e [filename] Wireless Security • Wireless Device Communicate  Directly- Ad Hoc Mode • Remember this term • Through an access point (AP) Wireless Access Point (WAP) • Most networks use wireless (AP) • Creates Hotspots Security Must be configured SSID-Security Set Identifier • Broadcast presence of WAP • Disable SSID broadcasting to hide WAP Filter MAC Addresses

More about Summary

Open Document