Questions Flashcards
Outline the features of a virtual private network (VPN)
VPN transmission is always encrypted / provides a secure connection;
Establishes the tunnel between sender/receiver;
Sender/receiver is authenticated before sending/receiving;
VPN users have access to all services available;
Protocols
Protocols are sets of rules for transmitting data correctly;
Usability
refers to making the system easy to use and matching it closer to user needs/requirments
explain how a virtual private network
(VPN) allows a travelling salesperson to connect securely to their company’s network.
Tunnelling protocols;
Allows the data to be encapsulated/hidden whilst travelling across the internet;
The use of gateways;
Allows the salesperson to connect with the company’s server;
Prototype
Prototype is used to ensure all essential functions/operations of the system are present/meets the needs of the users;
Prototype is used to speed up development process;
Positive user’s feedback helps in refining the acceptable prototype in order to develop the complete system/product;
Or else a further prototype should be created in order to develop the satisfactory system/product;
Discuss two possible problems that may occur during data migration.
Data loss/data corruption;
When moving data, from one storage device to another (via network/ cables or transferred by people), data could be corrupted/lost and not useful anymore;
Incompatibility of data formats;
Necessary to translate from one format to another, to be able to use the data in the new system which causes delays/performance issues in business/office operation;
Ethernet, extranet and wirless:
extranet allows extneral users specified access to an orafgnIation network
ethernet is wired connection
wireless is wired internet
Ethernet is a type of wired networking technology that uses cables to transmit data between devices.
Describe two features of a VPN that make it secure.
Encryption;
Any Data intercepted will not be readable;
Vpns use
Symmetric encryption: This involves the use of a single secret key to encrypt and decrypt data. Both the sender and the receiver use the same key to encrypt and decrypt the data.
and
Asymmetric encryption: This involves the use of two keys, a public key and a private key, to encrypt and decrypt data. The sender uses the recipient’s public key to encrypt the data, and the recipient uses their private key to decrypt it.
Tunnelling software;
Security properties of each tunnel should be agreed by the administrators of the two endpoints of the tunnel;
Tunneling software ensures that all data transmitted between the user’s device and the VPN server is secure and private, protecting the user’s sensitive information
Multiple exit nodes;
Makes it hard to distinguish where the data was generated thus more secure (less
prone to phishing);
State one technology that is necessary for a VPN.
IPsec with encryption;
Functions of an operating system
Provides a user interface
Does memory management
Allows multi-tasking
Providessecurity
desrcibe two problems that cna occur from data migration
Incompatible file formats;
Which could lead to incomplete or incorrect data transfer;
data loss
Describe the role of a router in this network.
controls the flow of data in the network;
inspects address of data packets;
directs to the appropriate network path/ selects a path between networks (by inspecting address of data packets);
securely transmits data packets (across that path toward the intended destination);
Describe two hardware components the school will need to implement the wireless network.
Wireless) router;
A central hub for all the computers to connect to;
Enables wireless network packet forwarding and routing;
Wireless repeaters;
To expand the reach of the network;
Identify two technologies the school would require to provide a VPN.
Encryption protocol IPSec
VPN Server
Encryption
Data encryption refers to calculations/algorithms that transform plain text into a form that is non-readable to unauthorized parties