3.1.15 - Describe the different methods of network security. Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Describe the need for wireless security.

A

Wireless data transfer can be vulnerable to security threats, as the signals are transmitted over the air and can be intercepted by unauthorised users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 factors of security?

A

1) Confidentiality
2) Integrity
3) Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give 4 reasons why securing network systems is difficult.

A

1) It is (pretty much) impossible to plan for every eventuality.
2) Insiders can go rogue.
3) Systems can unravel from one weak point.
4) Users are unpredictable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is authentication?

A

Authentication is the process of verifying the identity of users who access the wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can authentication be done?

A

Authentication can be done using various methods, such as passwords, digital certificates, and biometric authentication. One, two and three factor authentication can be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe firewalls.

A

Firewalls are a security device that monitors and controls incoming and outgoing network traffic, analysing data packets based on a predetermined set of rules. They can be used to block unauthorised access to the network, prevent malware and virus attacks, and protect sensitive data. They can be hardware or software (or a hybrid of both).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are MAC addresses?

A

Media Access Control (MAC) addresses are unique identifiers assigned to network interface controllers which are used to identify specific pieces of hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How are MAC addresses used for security?

A

Routers and switches can block certain devices depending on their MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State 4 physical security measures.

A

1) Locked doors.
2) Access control, e.g. biometrics.
3) Offsite backups.
4) CCTV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name 3 wireless encryption algorithms.

A

1) WEP (Wireless Equivalent Privacy).
2) PSK (Pre-shared Key).
3) WPA (Wi-Fi Protected Access), WPA2, WPA3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly