My InfoTech Journal: Decoding the Networking Enigma: OSI vs. TCP/IP Reference Models The OSI (Open Systems Interconnection) Reference Model and the TCP/IP (Transmission Control Protocol/Internet Protocol) Reference Model: The OSI Reference Model and the TCP/IP Reference Model are both conceptual frameworks used to understand and standardize how different networking protocols and technologies interact. Here are some areas of comparison: 1. Number of Layers: OSI Model : It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and TCP/IP Model : It has four layers: Network Interface, Internet, Transport, and Application. 2. L ayer Functionality: OSI Model : Tends to be more comprehensive and abstract, defining each layer's functions independently. TCP/IP Model : Reflects the actual implementation of the Internet and focuses on how protocols are used in practice. 3. Adoption / Use: OSI Model : Less commonly used in practice, but it is still valuab...
My InfoTech Journal:What you can do to minimize the risk of your wireless network?
Access Points are usually targets for unauthorized access. You have to ensure that your access points are secured to prevent unauthorized access.
There are several ways of securing your wireless access points.
Here is a Security Tip from the US CISA.
- Change default password.
- Restrict access.
- Encrypt the data on your network.
- Protect your Service Set Identifier (SSID).
- Install a Firewall.
- Maintain Anti-Virus software.I
- Use file sharing with caution.
- Keep your access point software patched and up to date.
- Check your internet provider’s router or router manufacturers wireless security options.
- Connect Using Virtual Private Network (VPN).
A more detailed discussion of this tip can be found in this post:
US CISA: Security Tip (ST 005-003) Securing Wireless Networks
End Notes
Disclaimer
This article is a result of my personal research and is not a substitute for legal advise.
Please consult your Legal Team, Ethics & Compliance, or Regulatory Team for the interpretation of specific CyberSecurity requirements.
Comments
Post a Comment