1- References
Canavan. J. (2001, April 25). Password Guidelines. Retrived on April 20. from Artical pp 39-142
2- Summary
The passage was about how we can keep our security at high level by making a strong password. The author indicated som main points in this subject. First, we should avoid in our passwoords anything that is word, one letter , a telephone number, a birthday, or some account usernames. Also, our passwords must include special symbols to prevent anyone from attacking it. Second, the maxmium life of the password is 45 days, and they must change it. After that, he mentioned som systems that can creat password randomly. But he disagree with this idea because it is hard to remember the password. Lastly, he indicated Shadow password files that give you an extra level of security by keeping an encrypted in a separeted file from the password file.
3- Reaction
I strongly agree with the writer in every point. In fact, the password is the most important part of the security. If we make a strong password, and we avoid what we should avoid, we will reduce the probabilities of stealing the password, Let us take our university(SIU) as a good example. SIU changes their passwords every 3 months, and you must cgange your e-mail (SIU) password at most every 3 months as well. On the other hand, there are some universities that ignore this side of security, such as my previous universty, which makes the level of the password low. When I go back to my country, I am going to develop the security of the password because I believe that having a strong password is the main key to preventing someone from attacking your system, computers, and network.
Ahmed Althomali
Monday, May 9, 2011
The Best Security for Wireless Networks
1- References
Baker P. (April 25, 2011). The Best Security for Wireless Networks
Retrieved on May 5,2011 from:
http://www.esecurityplanet.com/trends/article.php/3931731/article.htm
2- Summary
The article was about how we can make wireless security the best. In the beginning the author mentioned to the importance of having a strong wireless security. Then, she gave us some tips to protect or wireless network. First, realize the threat is both physical and virtual because these days Hackers do not steal only information, they break our virtual things. Second, we should use WPA2 protocol instead of WPA because the second one is easy to break into. Third, Chang all routers defaults, and put in your password numbers, letters, and symbols. Lastly, change router’s default network range because the Hackers can guess it easily.
3- Reaction
Wireless network security is one the most significant topic these days because if we could protect or wireless strongly, we would not have had any issue. In fact, I use to work as a Hacker for a period of time, but I quit since 2008. Therefore, I have a good experience with attacking and protection. The hard thing was faced me when I was work as a Hacker that when someone has a very strong password which consist of numbers, letters, and symbols. Also, I find a typical router’s defaults number, it will be easy to break the network for me. Therefore, everyone should follow those steps to make his system stronger. Moreover, I am looking forward to develop my knowledge in protection by combining my last experience with my current experience to get a great job with a big company in security department.
Introduction to Wireless Network Security and Security in 6 Easy Steps
Reference
Bradley T.(n.d)Introduction to Wireless Network Security and Security in 6 Easy Steps. About.com. Retrieved on April 27, 2011, from
http://netsecurity.about.com/od/hackertools/a/aa072004b.htm
Summary
We should change the system ID to prevent the Hackers to attack our networks. And, enable inscription which is hard to do it by people who have not majored in computer. Then, use a good firewall and Change the Default Administrator Password which is the password on your wireless network, and keep your firewall up to date with updating windows.short period of time. Finally, I came to the United States to study this thing because it has a very strong universities on this filed. The article was about introduction to wireless networks security and some steps to secure your wireless networks. First, the author mentioned to the beginning of the network and how it started entering the houses. Also, he explained the setup of the internet which is a kind of the networks. We need provider to connect with wireless access point and router to broadcast the signal and receive it again. Then, the author indicated to a problem with having this technology which allows to people attack your system easily. Finally, He gave us some steps help us to protect our wireless networks.
Reaction
I believe that everyone has to have experience with wireless networks security to protect his computer and prevent anyone to access his system. Also, it is the most important aspect for the companies when they think to build their networks. For example Pentagon has changed and updated its networks and security every day. In addition, every bank works to improve its privacy and system by building a strong security. Moreover, I have chosen this filed for two reasons. First, I’m so interested to know and work with the security because my computer attached many times. Second, I can earn a lot of money more than many jobs in
Bradley T.(n.d)Introduction to Wireless Network Security and Security in 6 Easy Steps. About.com. Retrieved on April 27, 2011, from
http://netsecurity.about.com/od/hackertools/a/aa072004b.htm
Summary
We should change the system ID to prevent the Hackers to attack our networks. And, enable inscription which is hard to do it by people who have not majored in computer. Then, use a good firewall and Change the Default Administrator Password which is the password on your wireless network, and keep your firewall up to date with updating windows.short period of time. Finally, I came to the United States to study this thing because it has a very strong universities on this filed. The article was about introduction to wireless networks security and some steps to secure your wireless networks. First, the author mentioned to the beginning of the network and how it started entering the houses. Also, he explained the setup of the internet which is a kind of the networks. We need provider to connect with wireless access point and router to broadcast the signal and receive it again. Then, the author indicated to a problem with having this technology which allows to people attack your system easily. Finally, He gave us some steps help us to protect our wireless networks.
Reaction
I believe that everyone has to have experience with wireless networks security to protect his computer and prevent anyone to access his system. Also, it is the most important aspect for the companies when they think to build their networks. For example Pentagon has changed and updated its networks and security every day. In addition, every bank works to improve its privacy and system by building a strong security. Moreover, I have chosen this filed for two reasons. First, I’m so interested to know and work with the security because my computer attached many times. Second, I can earn a lot of money more than many jobs in
Thursday, April 7, 2011
Wireless sensor networks
R R J #1
References
Howard, W. (2011, March 14). Wireless sensor networks
From http://radar.oreilly.come/2011/ wireless sensor networks.html
Summary
This article was about how wireless sensor networks can be the most important things in our future. Wireless sensor networks can develop our lives if we employed it in the appropriate way. There are three skills to build wireless sensor networks that are trust, patience, and following instructions moderately. Also, the price of this technology is cheap, but if we make it cheaper, it will be a great improvement. In the future, the writer looks forward to how the technology is adjusted by themself.
Reaction
I believe this technology will change the world’s system for many reasons. For example, with this technology; we can protect a really huge area. Also, we can do many things at the same time. And the traffic lights a great example because we will get rid of traffic headaches with this technology. However, the disadvantage of this technology is the security. Actually, the level of security in wireless sensor networks is very low. It is a big headache that faces the scientists these days, and they are working to solve it. In addition, many countries have already started working in wireless sensor networks because they believe this technology will be a part of everything around the world. In act, in my master’s degree, I will major in wireless sensor networks because my country needs this technology.
Subscribe to:
Posts (Atom)