3_5_3 Understand Network Security

You should be able to:

  • Understand the need for, and importance of, network security.
  • Explain the following methods of network security:

•• authentication

•• encryption

•• firewall

•• MAC address filtering

REVISE:

Why does a network need to be secure?

  • The data protection act means that you are responsible for any data that you store on another person. This must be kept safely and securely or you are liable to prosecution.
  • If a cracker gains physical access to a network then they could cause serious damage to the data and the network infrastructure.

Authentication

Authentication is checking that the user trying to access a network is allowed access to that network. The most common type of authentication is a username and password. This can be made more secure through:

  • Additional data (a 2nd password)
  • Finger print ID
  • Voice recognition
  • RFID tags and readers
  • Chip and pin
  • Iris scanners

Encryption

Encrypting data is encoding it using a key. That key must then be used to decrypt the data. This is how HTTPS works. This video shows how public and private keys are used to exchange encrypted data.

Firewall

Firewalls protect a network from unwanted access from outside the network. Watch this video for a thorough explanation.

MAC Address Filtering

Any device that is designed to access a network has a factory installed MAC address. It is a unique identifier for a network device. A company can set up a network so that only registered MAC Addresses can access it. It is possible to gain a MAC Address and "spoof" it to gain unauthorised access. This is why other authentication is essential to avoid this happening.

TEST:

  1. Download and print the test paper here: https://drive.google.com/open?id=0B5fLtQ0Xgr2PU0swS1pmZlI4Nnc
  2. Try the mock test yourself.
  3. Use the 3.5.3 Walking Talking Mock below to guide you through answering the questions.

SOURCE RECOGNITION - PLEASE NOTE: The examination examples used in these walking talking mocks are samples from AQA from their non-confidential section of the public site. They also contain questions designed by TeachIT for AQA as part of the publicly available lesson materials.