3.1.15+Describe+different+methods+of+security

===**Describe the different methods of network security. Include encryption types, user ID, trusted media access con**trol (MAC) addresses. S/E Wireless networks have led to concerns about the security of the user’s data.===

**Encryption**
You are using encryption on your wireless network, aren't you? By now, there are extremely few manufacturers producing Access Points (AP) that aren't secured by default, or as part of the setup process. Here’s a small explanation of the various wireless LAN security methods:
 * Wireless Encryption**

Often mistakenly referred to as the “Wireless Encryption Protocol”, this is a depreciated method of wireless security which can be cracked by a malicious individual within minutes (PDF link). So what you really need to know is don’t use it. It’s usually easily identifiable, since the password is generally a series of hexadecimal characters (that is: 0–9, A–F).
 * Wired Equivalent Privacy (WEP)**

WPA, and it’s more secure and more resource intensive successor WPA2 use a few different methods to encrypt traffic. The differences between WPA and WPA2 lie in the encryption methods used, TKIP and the AES-based CCMP respectively. There are flaws in the older TKIP protocols that can also be used to gain access to your network, but it tends to be more compatible with older hardware (and even modern hardware, such as the Sony PSP and the Nintendo DS) which may limit your ability to run a WPA2-only network.
 * Wi-Fi Protected Access (WPA)**

PSK is the most common method of securing a wireless network, mostly because it’s the easiest to implement and doesn't require a separate authentication server (more on that later). In this method, everyone on your secure wireless network connects to access points utilizing the same password, which is probably known by everyone. For a home environment, this is probably OK. You’d assume that most of the people you’re letting on your network are your friends or family, and – depending on the quality of your friends and family – you can probably trust them with access to your network. The trouble with PSK is, especially for businesses, that if you want to remove one user’s access to your network, you need to give everybody else the new key. This may include all of your employees, contractors, and any other guests that have been on your network. It could be a lot of work for a large company, especially if it’s all because of one employee leaving the company. There’s a solution, and most corporations already have the tools necessary to implement the fix.
 * Pre-shared Key (PSK)**

(Taken from http://blog.irisproservices.com/2010/04/19/wireless-network-security-wep-wpa-encryption-and-you/)

**User ID**
Also known as a username, a user ID is the name a user logs in to a system with. Usually used alongside a password it is one half of a set of credentials a user knows in order to access a system.

Authentication
Something the user knows: Anything that the user knows that is required to access the network. E.g. a password || || Something the user has: Anything that the user physically has with him/her that will allow him/her to access the network, possibly by sending it a password or with a RF-ID chip. || || Something the user is: For example an eye, that will be read with **a retina scan or a finger print.** || ||
 * **One factor authentication**
 * **Two factor authentication**
 * **Three factor authentication**

**Firewall**
Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. It may be hardware or software.

**Physical Security**
Something that is physically in the way of someone breaking into a system. E.g. a door, or walls, or security guards.