Please enable JavaScript.
Coggle requires JavaScript to display documents.
Computer networks- Security - Coggle Diagram
Computer networks- Security
Authentication
Needed to access a network
Types of authentication-
Something you are, e.g. username, back account number or anything that identifies the user uniquely.
Something you know, e.g. password, pin, secret answer to a question.
Something you have, e.g. swipe card, bio metrics, any other physical identifying device.
Encryption
The process of disguising a message so that it cannot be understood by anyone but its intended recipient.
It requires the use of a key.
This key is secret as to how the message has been disguised.
Firewall
A software that block unexpected connections coming in and out of a network.
Most operating systems include a firewall as a piece of software, but they can also be hardware devices that sit alongside or as part of the router.
MAC address filtering
MAC address- a physical address embedded within the device's network adapter.
Types of lists-
White list- Only the device address on the list are allowed to access the network.
This is more secure, but creates extra work for the network manager as they must add data every time a new device needs to join the network.
Black list- devices on the list are banned from the network.
This is less secure than a white list, but easier to maintain.