Authentication

Home/Tag:Authentication

RADIUS

2020-09-24T11:46:34+00:00Categories: Microsoft, Network Administration|Tags: , , , , , , , , , |

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol, operating on ports UDP 1645 and UDP 1812 that provides centralized AAA (Authentication, Authorization, and Accounting) management for users who connect and use a NAS (network access server  such as VPN concentrator, router, switch). This protocol is a client/server protocol and software that enables remote [...]

Wireless Security Protocols

2020-09-26T05:59:54+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. In this post, we'll take a look at wireless security protocols to help you understand the different aspects of these protocols. Source:  en.wikipedia.org There are several types of wireless security Protocol that you’ll come [...]

Password Managers

2020-09-23T14:09:15+00:00Categories: Network Administration, Network Security|Tags: , , , , , , , , , , , , , |

Why is it recommended to use password managers? These days, every new website and application we sign up for is another password we have to remember. In fact, the number of passwords we need to remember is so high that we may forget all or part of them. If we write down passwords in a [...]

Manage Identification and Authentication

2020-07-16T06:39:28+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Manage Identification and Authentication of People, Devices, and Services In this part of this tutorial, we'll take a look at Manage Identification and Authentication of People, Devices, and Services to help you understand the different aspects of authentication. Identity Management Implementation The core activity within identity and access management (IAM) is the management of [...]

Cryptography- Part 1

2020-07-15T13:19:32+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Cryptography- Part 1 This page we discuss cryptography, concepts, algorithms, attacks, and management. The sensitivity of assets is determined by confidentiality and integrity requirements and the impact of compromise on the corporation. Cryptography is the science of encrypting and decrypting communications to make them unintelligible for all but the intended recipient. Cryptography used to [...]

Go to Top