Explain the following methods of network security:
authentication
encryption
firewall
MAC address filtering.
Authentication ensures only authorised users can log into the network.
Encryption ensures only users with the decryption key can view the real.
MAC address filtering ensures only trusted devices can connect to the network, or ensures non-trusted devices cannot connect to the network.
Firewalls monitor and filter out traffic to and from undesirable locations.
The process of confirming that a user is who they say they are.
Better systems use two-factor authentication, which adds a second level of security to overcome after the user has entered their username and password.
A key of 5 means shift 5 places.
plaintext | A | B | C | D | E | F | G | K | L |
ciphertext | F | G | H | I | J | K | L | M | N |
Caesar cypher with a key of 5.
Encrypting and decrypting data needs a key.
So LEAD becomes NJFI.
The computer would send NJFI and the key 5.
NOTE: Computers use a far more complicated system feel free to go research
Encryption disguises the content of the data so that it cannot be read if it is intercepted.
A MAC address uniquely identifies each device that is connected to a network.