3.1.15 - Describe the different methods of network security

Encryption types, userID, trusted media access control (MAC) addresses

Assessment objective 2

Exit skills:

  • Define the terms symmetric key encryption, public key encryption and trusted media access control (MAC) addresses

  • Describe the different methods that can be used to increase security of the user’s data

  • Explain the use of symmetric key encryption, public key encryption and trusted media access control (MAC) addresses

Google Presentation