3.1.15 - Describe the different methods of network security. Flashcards
Describe the need for wireless security.
Wireless data transfer can be vulnerable to security threats, as the signals are transmitted over the air and can be intercepted by unauthorised users.
What are the 3 factors of security?
1) Confidentiality
2) Integrity
3) Availability
Give 4 reasons why securing network systems is difficult.
1) It is (pretty much) impossible to plan for every eventuality.
2) Insiders can go rogue.
3) Systems can unravel from one weak point.
4) Users are unpredictable.
What is authentication?
Authentication is the process of verifying the identity of users who access the wireless network.
How can authentication be done?
Authentication can be done using various methods, such as passwords, digital certificates, and biometric authentication. One, two and three factor authentication can be used.
Describe firewalls.
Firewalls are a security device that monitors and controls incoming and outgoing network traffic, analysing data packets based on a predetermined set of rules. They can be used to block unauthorised access to the network, prevent malware and virus attacks, and protect sensitive data. They can be hardware or software (or a hybrid of both).
What are MAC addresses?
Media Access Control (MAC) addresses are unique identifiers assigned to network interface controllers which are used to identify specific pieces of hardware.
How are MAC addresses used for security?
Routers and switches can block certain devices depending on their MAC address.
State 4 physical security measures.
1) Locked doors.
2) Access control, e.g. biometrics.
3) Offsite backups.
4) CCTV.
Name 3 wireless encryption algorithms.
1) WEP (Wireless Equivalent Privacy).
2) PSK (Pre-shared Key).
3) WPA (Wi-Fi Protected Access), WPA2, WPA3.