Network

Network

 * Network || A grouping of two or more computer systems linked together. ||
 * NIC || Network Interface Card ||
 * LAN || Local Area Network, 1 switch ||
 * firewall || hardware or software designed to block unauthorized access while permitting authorized communications, configured to permit or deny network transmissions based upon a set of rules and other criteria. ||
 * packet || formatted unit of data ||
 * NAT || Network Address Translation, enables a LAN to use one set of IP addresses for internal traffic and a second set of addresses for external traffic. ||
 * PAT || Port Address Translation, each computer on a LAN transmitted the same IP address with a different port number assigned. ||
 * SSH || secure shell ||
 * VPN || Virtual Private Network ||
 * failsafe || a device that prevents other devices from failing ||
 * failover || a system of having backups such as redundant disks so that if part of a system or network go down, operations can continue unimpeded ||
 * Data Leakage || Loss of control over data. Unauthorized transfer of data. ||
 * DHCP || Server that assigns IP addresses in a network. ||
 * router || Directs internet traffic to the appropriate server or computer. ||


 * WI-FI**
 * Wi-Fi || Wireless Local Area Network ||
 * WEP || Wired Equivalent Privacy, weakest form of wireless security ||
 * WPA || Wi-Fi Protected Access, security that is good enough for home use ||
 * WPA2 || enterprise level security ||
 * 802.1x || best type of authentication available ||
 * SSID || Network Name that is broadcast through a beacon. ||
 * NIC MAC || Network Interface Card Machine Address. 48 bits in hexadecimal. First 24 bits denote manufacturer. Second 24 bites denote exact card. ||
 * AP || Access Point, connecting to hardware. ||
 * EAP || Extensible Authentication Protocol. ||


 * Securing a Wi-Fi Network**

1. Login to the router. 2. Decide whether or not the network needs to be visible to the outside world. a. if yes, select the highest security available. At least WEP, WPA2 is best. Apply a strong pass-phrase. b. if no, turn off the beacon. 3. If only certain computers need to access the router, their MAC address can be added to a white list. This list will allow them to connect and no one else. 4. The SSID name should be changed to something obscure. This prevents people from knowing what kind of router you have. 5. The admin password should be a strong pass phrase and the name "admin" changed if possible.