Study Notes
Securing data on a network involves using various methods to protect information from unauthorized access, interception, and loss. These methods are crucial for maintaining the integrity and confidentiality of data in different contexts, such as homes, schools, and businesses.
- Log-ins and Passwords — authenticate users to ensure only authorized individuals access the system. Example: A student uses a unique username and password to access school computers.
- File Access Rights — control what users can do with files on a network. Example: Teachers have permission to delete files, while students can only read them.
- Firewalls — act as barriers between trusted networks and untrusted external networks. Example: A firewall blocks suspicious traffic from entering a school network.
- Encryption — converts readable data into an unreadable format to protect it. Example: HTTPS encrypts data sent between a user's browser and a website.
- WEP and WPA — encryption protocols for securing wireless networks. Example: WPA2 is used to secure a home Wi-Fi network.
- Virtual Private Networks (VPNs) — create encrypted tunnels for secure communication over the internet. Example: Employees use a VPN to access company resources remotely.
- Transaction Logs — record network activity to detect misuse and troubleshoot errors. Example: Logs show who accessed files and when.
- Backups — create copies of data to prevent loss from failures or attacks. Example: A business backs up its data to an external drive daily.
Exam Tips
Key Definitions to Remember
- Log-ins and Passwords: First line of defense in network security.
- File Access Rights: Permissions controlling user actions on files.
- Firewalls: Barriers that monitor and block network traffic.
- Encryption: Process of converting data into an unreadable format.
- VPNs: Secure tunnels for internet communication.
Common Confusions
- Confusing WEP with WPA: WEP is outdated and less secure than WPA.
- Thinking all firewalls are the same: Hardware and software firewalls serve different purposes.
Typical Exam Questions
- What is a strong password? A strong password is at least 8-12 characters long, mixing letters, numbers, and symbols.
- How does a firewall protect a network? A firewall monitors and blocks suspicious traffic based on security rules.
- Why use encryption for data in transit? Encryption protects data from being read if intercepted during transmission.
What Examiners Usually Test
- Understanding of different security methods and their purposes.
- Ability to match security methods to specific risks or scenarios.
- Knowledge of how to implement layered security effectively.