Computing - 5 Fundamentals of Computer Networks - 3 Network Security

0.0(0)
studied byStudied by 5 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

Network security methods [4]:

- authentication
- encryption
- firewall
- MAC address filtering

2
New cards

Authentication

verifying the identity of the person or device attempting to access the system

3
New cards

Examples of authentication [4]:

- password
- pin pattern
- facial identification
- fingerprint

4
New cards

Encryption

process of converting readable data into unreadable characters to prevent unauthorised access

5
New cards

Types of encryption [2]:

- symmetric encryption
- asymmetric encryption

6
New cards

Symmetric encryption

encryption method where the same key is used to encode and to decode the message and this key must be transferred

7
New cards

Asymmetric encryption

two keys are used - one public key to encode the message, and one private to decode it

8
New cards

Caesar cipher

substitution cipher that shifts characters a certain number of positions in the alphabet

9
New cards

Wireless encryption standards [2]

- WEP
- WPA

10
New cards

WEP stands for...

Wired Equivalent Privacy

11
New cards

WPA stands for...

Wi-Fi Protected Access

12
New cards

Why must data be encrypted?

it could be intercepted while being transmitted over a network

13
New cards

HTTP stands for...

Hypertext Transfer Protocol

14
New cards

HTTPS stands for...

Hypertext Transfer Protocol Secure

15
New cards

Hypertext Transfer Protocol

set of rules for transferring data from web servers to browsers

16
New cards

Hypertext Transfer Protocol Secure

extension of HTTP where data is encrypted so it can be transferred securely

17
New cards

'Strong' encryption

useful lifetime of encrypted data is less than the time taken to break the code

18
New cards

'Weak' encryption

code can be broken in time to use the information

19
New cards

Firewall

software or hardware on servers that only allows traffic through according to some set of security rules

20
New cards

Firewall capabilities [5]:

- monitor network traffic
- allow or block traffic depending on filtering rules
- prevents access by attackers to networked computers
- blocks certain malicious computers using packet filters
- prevents access to certain network ports

21
New cards

Packet filter

detects and blocks data packets from malicious computers using an IP address

22
New cards

MAC address filter

filter built into wireless routers that can block certain devices using their MAC address