Library items tagged: security

Anonymous
A number of wireless LAN management systems have recently introduced functions that attempt to suppress rogue access points. Organisations considering using these should ensure that they are covered by their agreements with their users and their neighbours, otherwise their actions are likely to be highly unpopular and possibly even illegal.
Anonymous
Scott Armitage, Loughborough University October 2011 Wireless networks have become ubiquitous as a means of connecting to a network. It is unlikely that there are any remaining academic institutions in the UK which don’t offer some kind of wireless networking. However, many wireless network operators have little knowledge regarding the possible ways in which their wireless infrastructure can be attacked. This document briefly describes some of the common attacks which can be performed against IEEE 802.11 based networks.
Anonymous
This is the link to user authentication information: https://community.jisc.ac.uk/library/janet-policies/user-authentication
Anonymous
This information is at: https://community.jisc.ac.uk/library/janet-policies/guest-and-public-net...
Anonymous
See also: WPA2 vulnerability found (external link)
Anonymous
Obtaining Advice Security Mailing Lists
Anonymous
Network Authentication Methods eduroam
Anonymous
JANET(UK) recommends that organisations connected to JANET carry out their own internal monitoring of their network connection. On a simple level the JANET Netsight system can highlight abnormal traffic levels on a site's access link that may be a result of illegal activity. The JANET Factsheet Unusual Traffic gives examples of how Netsight can be used to detect these kinds of problems.
Anonymous
A firewall is a system that implements and enforces an access control (or security) policy between two networks, for example between an internal private network and an external public network. Essentially, a firewall connects two or more networks but only allows specified forms of traffic to flow between them.