Connection Types and Their Function Flashcards
Wired Connections
Ethernet is the most widespread and commonly used wired connection type. It provides a secure, high-speed data transmission between devices, such as computers, routers, and switches, using Category 5 (Cat5) or higher cables. Ethernet connections are generally considered more reliable and secure compared to wireless connections because they are less vulnerable to interference and unauthorized access.
USB (Universal Serial Bus)
USB is a popular connection type, primarily used for connecting peripheral devices such as keyboards, mice, and storage devices to computers. While USB provides a convenient way of expanding a computer’s functionality, it also poses security risks. Using untrusted USB devices can lead to the spread of malware, making it essential to ensure that only trusted devices are connected to your system.
Wireless Connections
Wi-Fi is the most prevalent wireless connection type, allowing devices to connect to the internet and each other without the need for physical cables. Although Wi-Fi provides greater flexibility and mobility, it introduces additional security risks. To minimize these risks, always use encryption (preferably WPA3 or WPA2), strong passwords, and update your router’s firmware regularly.
Bluetooth
Bluetooth is another widely used wireless connection type, primarily designed for short-range communication between devices such as smartphones, speakers, and headsets. While Bluetooth offers convenience, it can also be susceptible to attacks, such as Bluesnarfing and Bluejacking. To mitigate these risks, keep your devices updated, use Bluetooth 4.0 or higher, and disable Bluetooth when not in use.
Network Connections
A VPN is a secure tunnel that creates a private network connection over a public network (such as the internet) by encrypting data transfers between devices. VPNs help protect sensitive information from being intercepted by unauthorized parties and are especially useful when accessing public Wi-Fi hotspots. Always use trusted VPN providers to ensure your data remains encrypted and private.
Peer-to-Peer (P2P)
P2P is a decentralized connection type where devices connect directly with each other, without the need for a central server. P2P is commonly used for file-sharing services and can pose significant security risks if utilized without adequate security measures in place. To minimize risks, avoid using untrusted P2P services and refrain from sharing sensitive information on such networks.
NFC
Near Field Communication, orNFC, is a short-range wireless communication technology that enables devices to interact with each other within a close proximity, typically within a few centimeters. It operates at a frequency of 13.56 MHz and can be used for various applications, such as contactless payment systems, secure access control, and data sharing between devices like smartphones, tablets, and other compatible gadgets.
How NFC Works
When two NFC-enabled devices are brought close to each other, a connection is established, and they can exchange data with each other. This communication is enabled throughNFC TagsandNFC Readers. NFC Tags are small integrated circuits that store and transmit data, while NFC Readers are devices capable of reading the data stored in NFC Tags.
NFC Modes
NFC operates primarily in three modes:
Reader/Writer Mode
Peer-to-Peer Mode
Card Emulation Mode
Reader/Writer Mode (NFC)
This mode enables the NFC device to read or write data from or to NFC Tags. For example, you can scan an NFC Tag on a poster to access more information about a product or service.
Peer-to-Peer Model (NFC)
This mode allows two NFC-enabled devices to exchange information directly. Examples include sharing data such as contact information, photos, or connecting devices for multiplayer gaming.
Card Emulation Mode (NFC)
This mode allows an NFC device to act like a smart card or access card, enabling contactless payment and secure access control applications.
NFC Security Concerns
Eavesdropping: Attackers can potentially intercept data exchange between NFC devices if they manage to get into the communication range.
Data manipulation: Attackers might alter or manipulate the data exchanged between the devices.
Unauthorized access: An attacker can potentially exploit a vulnerability in your device, and gain unauthorized access to sensitive information.
NFC Best Practices
To minimize the risks associated with NFC, follow these best practices:
Keep your device’s firmware and applications updated to minimize known vulnerabilities.
Use strong and unique passwords for secure NFC applications and services.
Turn off NFC when not in use to prevent unauthorized access.
Be cautious when scanning unknown NFC Tags and interacting with unfamiliar devices.
Ensure you’re using trusted and secure apps to handle your NFC transactions.
WIFI
WiFistands for “wireless fidelity” and is a popular way to connect to the internet without the need for physical cables. It uses radio frequency (RF) technology to communicate between devices, such as routers, computers, tablets, smartphones, and other hardware.