Library items tagged: factsheet

Anonymous
PB/INFO/082 (11/04) Many organisations are looking to have some form of penetration testing performed on their systems. This may simply be to evaluate existing security measures and to find gaps where security needs improvement, but increasingly it is performed to comply with security standards when connecting to public sector networks or processing payment details.
Anonymous
PB/INFO/071 (10/06) WEP, WPA or Other? The JANET Wireless Advisory Group (WAG) strongly advises the replacement of WEP techniques with WPA or WPA2/802.11i-based security, or alternatives such as encrypted VPN and self-securing protocols like SSH, as soon as possible.
Anonymous
PB/INFO/64 (11/05)
Anonymous
PB/INFO/065 (11/05) The Extensible Authentication Protocol (EAP) is best considered as a framework for transporting authentication protocols, rather than as an authentication protocol itself. EAP can be used for authenticating dial-up and VPN connections, and also Local Area Network (LAN) ports in conjunction with IEEE 802.1X.
Anonymous
Wireless LAN Security
Anonymous
Two significant factors in the security of any network are the measures that exist to ensure accountability for and privacy of traffic: in other words, to control the ability to send packets to the network and to read packets from the network. Different networks have different characteristics. For example:
Anonymous
A number of wireless LAN management systems have recently introduced functions that attempt to suppress rogue access points. Organisations considering using these should ensure that they are covered by their agreements with their users and their neighbours, otherwise their actions are likely to be highly unpopular and possibly even illegal.
Anonymous
This is the link to user authentication information: https://community.jisc.ac.uk/library/janet-policies/user-authentication
Anonymous
This information is at: https://community.jisc.ac.uk/library/janet-policies/guest-and-public-net...
Anonymous
PB/INFO/069 Most users know vaguely that web addresses beginning http:// and https:// are different. An https:// web site (‘secure HTTP’) provides users with some protection against some types ofInternet threat (though both server and client computers have to do more work):