3.1.15 - Describe the different methods of network security
Encryption types, userID, trusted media access control (MAC) addresses
Exit skills:
Define the terms symmetric key encryption, public key encryption and trusted media access control (MAC) addresses
Describe the different methods that can be used to increase security of the user’s data
Explain the use of symmetric key encryption, public key encryption and trusted media access control (MAC) addresses