Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Networking Fundamentals

You're reading from   Networking Fundamentals Develop the networking skills required to pass the Microsoft MTA Networking Fundamentals Exam 98-366

Arrow left icon
Product type Paperback
Published in Dec 2019
Publisher Packt
ISBN-13 9781838643508
Length 510 pages
Edition 1st Edition
Languages
Concepts
Arrow right icon
Author (1):
Arrow left icon
Gordon Davies Gordon Davies
Author Profile Icon Gordon Davies
Gordon Davies
Arrow right icon
View More author details
Toc

Table of Contents (23) Chapters Close

Preface 1. Section 1: Network Infrastructure
2. Differentiating between Internets, Intranets, and Extranets FREE CHAPTER 3. Understanding Local Area Networks 4. Understanding Wide Area Networks 5. Understanding Wireless Networking 6. Network Topologies - Mapping It All Out 7. Section 2: Network Hardware
8. Switches and Switching - Forwarding Traffic on a Local Network 9. Routers and Routing - Beyond a Single Network 10. Media Types - Connecting Everything Together 11. Section 3: Protocols and Services
12. Understanding the OSI Model 13. Understanding TCP/IP 14. Understanding IPv4 15. Understanding IPv6 16. Understanding Name Resolution 17. Network Services 18. Section 4: Mock Exams
19. Mock Exam 1
20. Mock Exam 2
21. Assessments 22. Other Books You May Enjoy

Understanding wireless security

Wireless communication could be described as a broadcast technology. Anything that is transmitted is available for all to hear or eavesdrop on. Can you spot what issues this may bring? If you said this leaves the data unsecure, you would be correct. Therefore any wireless deployment needs to ensure that appropriate measures are taken to protect the data.

There are three principles of data security that we need to bear in mind. These are classed as the CIA triad (sometimes the IAC triad) and form the basis of any security plan. CIA is an acronym for Confidentiality, Integrity, Availability:

  • Confidentiality: This refers to protecting data in such a way that only the people who are authorized to see it can do so.
  • Integrity: This is the trustworthiness of the data. Has the data been changed in any way? This may be through accidental corruption or...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image