Network security

From Computer Science Wiki
Jump to: navigation, search
Networksa group or system of interconnected people or things.[1]

Networka group or system of interconnected people or things. security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer networka group or system of interconnected people or things. and networka group or system of interconnected people or things.-accessible resources. Networka group or system of interconnected people or things. security involves the authorization of access to data in a networka group or system of interconnected people or things., which is controlled by the networka group or system of interconnected people or things. administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.[2]

Methods of networka group or system of interconnected people or things. security

encryption types

  • PSK (pre-shared key)
  • WEP (dead)
  • WPA / WPA2

userID

  • This method requires a user to presentOffer for display, observation, examination or consideration. authorized credentials, usually a username and password.

trusted media access control (MAC) addresses

  • This method uses unique MAC addresses of every host to authenticate it to a networka group or system of interconnected people or things. resource or networka group or system of interconnected people or things. packet switching device.

Advantages and disadvantages of networka group or system of interconnected people or things. security

I thank the Dartford grammar school for the use of this content[3]

encryption types

Advantages

  • A strong encryption is very hard to break
  • Computer are fast enough to encrypt data on-the-fly

Disadvantages

  • Often, users are lazy and take a password that is easy to guess
  • The password needs to be transmitted over the networka group or system of interconnected people or things. to receiver to allow them to read the message
  • Some encryptions are designed to have backdoors built in

userID

Advantages

  • Access rights to the networka group or system of interconnected people or things. can be set for each user
  • User groups can be created to manage user rights in batches

Disadvantages

  • A userID can be stolen
  • system can be bypassed
  • Does not protect against intercepting messages in the networka group or system of interconnected people or things.

trusted media access control (MAC) addresses

Advantages

  • Devices can be tightly controlled
  • Devices can be linked to a user
  • If you are whitelisting MAC addresses, this is a very secure way to prevent unauthorized devices from using your networka group or system of interconnected people or things.

Disadvantages

  • Change can be slower
  • Guest devices must be managed (this takes time)
  • MAC addresses can be spoofed

Standards

These standards are used from the IB Computer Science Subject Guide[4]

  • DescribeGive a detailed account or picture of a situation, event, pattern or process. the different methods of networka group or system of interconnected people or things. security.
  • EvaluateAssess the implications and limitations; make judgments about the ideas, works, solutions or methods in relation to selected criteria. the advantages and disadvantages of each method of networka group or system of interconnected people or things. security.

References

  1. http://www.flaticon.com/
  2. https://en.wikipedia.org/wiki/Network_security
  3. http://ib.compscihub.net/wp-content/uploads/2015/04/3.1.16.pdf
  4. IB Diploma Programme Computer science guide (first examinations 2014). Cardiff, Wales, United Kingdom: International Baccalaureate Organization. January 2012.