Network Security Flashcards
What is the Internet Protocol Address
Unique number, used to identify every device connected to the Internet
No 2 IP addresses are the same
If your computer requests a webpage, your computer’s IP address specifies where that web page should ultimately be delivered
What are 4 methods of filtering?
Authentication
Encryption
Firewalls
MAC address filtering
What was authentication
Measures to make sure that a person is trying to access data is who they say there are
Examples of authentication techniques
Usernames and passwords
Memorable information, such as their mother’s maiden name
Checking that they are using a recognised IP address
What is encryption
Scrambling data using a key to ensure that it makes no sense to anyone who intercepts it
How does encryption work?
When scrambled data is received, recipient also has a key, which can be used to decrypt the data, returning it to readable format
What are firewalls
Block certain traffic (such as emails from a suspect IP address)
Or
Only allow certain traffic (such as from a single, trusted device), blocking everything else
What can firewalls be
Software or hardware
What is a MAC address
Media Access control address which cannot be changed
Based on this unique identifier, specific devices can be either permitted onto, or blocked from, a network