Network security: Difference between revisions

From Computer Science Wiki
No edit summary
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
[[file:network.png|right|frame|Networks<ref>http://www.flaticon.com/</ref>]]
[[file:network.png|right|frame|Networks<ref>http://www.flaticon.com/</ref>]]


Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.<ref>https://en.wikipedia.org/wiki/Network_security</ref>
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.<ref>https://en.wikipedia.org/wiki/Network_security</ref> [[File:NetworkSecurity short.ogg]]




Line 45: Line 45:


=== trusted media access control (MAC) addresses ===
=== trusted media access control (MAC) addresses ===
==== Advantages ====
* Devices can be tightly controlled
* Devices can be linked to a user
* If you are whitelisting MAC addresses, this is a very secure way to prevent unauthorized devices from using your network
==== Disadvantages ====
* Change can be slower
* Guest devices must be managed (this takes time)
* MAC addresses can be spoofed


== Standards ==
== Standards ==

Latest revision as of 19:50, 16 May 2021

Networks[1]

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.[2]


Methods of network security[edit]

encryption types[edit]

  • PSK (pre-shared key)
  • WEP (dead)
  • WPA / WPA2

userID[edit]

  • This method requires a user to present authorized credentials, usually a username and password.

trusted media access control (MAC) addresses[edit]

  • This method uses unique MAC addresses of every host to authenticate it to a network resource or network packet switching device.

Advantages and disadvantages of network security[edit]

I thank the Dartford grammar school for the use of this content[3]

encryption types[edit]

Advantages[edit]

  • A strong encryption is very hard to break
  • Computer are fast enough to encrypt data on-the-fly

Disadvantages[edit]

  • Often, users are lazy and take a password that is easy to guess
  • The password needs to be transmitted over the network to receiver to allow them to read the message
  • Some encryptions are designed to have backdoors built in

userID[edit]

Advantages[edit]

  • Access rights to the network can be set for each user
  • User groups can be created to manage user rights in batches

Disadvantages[edit]

  • A userID can be stolen
  • system can be bypassed
  • Does not protect against intercepting messages in the network

trusted media access control (MAC) addresses[edit]

Advantages[edit]

  • Devices can be tightly controlled
  • Devices can be linked to a user
  • If you are whitelisting MAC addresses, this is a very secure way to prevent unauthorized devices from using your network

Disadvantages[edit]

  • Change can be slower
  • Guest devices must be managed (this takes time)
  • MAC addresses can be spoofed

Standards[edit]

These standards are used from the IB Computer Science Subject Guide[4]

  • Describe the different methods of network security.
  • Evaluate the advantages and disadvantages of each method of network security.

References[edit]

  1. http://www.flaticon.com/
  2. https://en.wikipedia.org/wiki/Network_security
  3. http://ib.compscihub.net/wp-content/uploads/2015/04/3.1.16.pdf
  4. IB Diploma Programme Computer science guide (first examinations 2014). Cardiff, Wales, United Kingdom: International Baccalaureate Organization. January 2012.