Page 245 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 245

Unit 14: Authentication




          However, programming all the authorized users' MAC addresses into all the company's access   Notes
          points can be an arduous task for a large organization and can be time consuming - but for the
          home technology enthusiast, or for small network installations, using a MAC filtering technique
          can be a very effective method to prevent unauthorized access.
          Media Access Control assigns a unique number to each IP network adapter called the MAC
          address. A MAC address is 48 bits long. The MAC address is commonly written as a sequence of
          12 hexadecimal digits as follows:
          48-3F-0A-91-00-BC
          MAC addresses are uniquely set by the network adapter manufacturer and are sometimes called
          physical addresses. The first six hexadecimal digits of the address correspond to a manufacturer's
          unique  identifier,  while  the  last  six  digits  correspond  to  the  device's  serial  number.  MAC
          addresses map to logical IP addresses through the Address Resolution Protocol (ARP).
          Some Internet service providers track the MAC address of a home router for security purposes.
          Many routers support a process called cloning that allows the MAC address to be simulated so
          that it matches one the service provider is expecting. This allows households to change their
          router (and their real MAC address) without having to notify the provider.

          Self-Assessment

          State whether the following statements are true or false:
          8.   All IEEE 802 network devices share a common 50-bit MAC address format.

          9.   Wireless  networks are a helpful method  for easily sharing network resources  and
               connections.
          10.   MAC addresses are uniquely set by the network adapter manufacturer.

          14.4 Public-key Cryptography

          Cryptography is the study of protecting information through the use of codes  and ciphers.
          Cryptography forms a fundamental part of message security.
          At its simplest, a code is a process of methodically changing information to make it unreadable
          without knowing how that information was changed. One of the earliest and simplest codes
          (called a Caesar cipher) worked by taking the alphabet and shifting all the letters by a fixed
          number. The sender and recipient would both know how many letters to shift and thus could use
          this code to change information so that each would be able to understand, but no one else could
          understand. This process of changing information into a code is encryption and the process of
          changing code back is decryption. The original message is referred to as "plaintext." The changed
          message is referred to as "ciphertext." The information that is used to change the plain text into
          ciphertext is referred to as the key. The particular way in which a key changes information is
          referred to as the algorithm.





             Notes   Plaintext  (or  cleartext)  in  this  context  should  not  be  confused  with  plain  text
             when referring to the format of an e-mail message. In that context, plain text is used to
             differentiate a message's format from HTML format or Rich Text Format (RTF). In the
             context of message security, plaintext is used to differentiate from ciphertext to indicate
             that the text is not encrypted.







                                           LOVELY PROFESSIONAL UNIVERSITY                                   239
   240   241   242   243   244   245   246   247   248   249   250