Wireless passwords: pre-shared key is used to authenticate to the wireless network.
Kerberos: Used on Windows to authenticate users in Active directory. (username and password)
Kerberos: The Protocol that allows users to use a username and password to log into any machine.
Multifactor: Combine multiple methods to increase security of login.
Sender Policy Framework : Authentication method that prevents email spoofing.
DKIM : Allows email servers to block spoofed sender addresses.
DMARC : provides analysis and reporting about who is sending emails from a given domain.
RADIUS: Centralize authentication for users
TACACS: Centralised authentication protocols used in businesses to authenticate users.
Kerberos: Assign a unique encrypted key, ticket, to each user connected to the network.
Unified threat management : A single hardware provides multiple security functions.
War driving: Searching for unsecured wireless networks.
UPnP: A networking protocol that allows devices to learn about the presence and communicate with each other.
Power level controls: adjusting the boundary range of a wireless signal
S/MIME: Encryption protocol that encrypts the contents of the mail.
Network Access Control: Rules a user attempting to connect to the network must comply with. (e.g., host must be free of virus and have patches applied).