You should be able to:
•• authentication
•• encryption
•• firewall
•• MAC address filtering
Authentication is checking that the user trying to access a network is allowed access to that network. The most common type of authentication is a username and password. This can be made more secure through:
Encrypting data is encoding it using a key. That key must then be used to decrypt the data. This is how HTTPS works. This video shows how public and private keys are used to exchange encrypted data.
Firewalls protect a network from unwanted access from outside the network. Watch this video for a thorough explanation.
Any device that is designed to access a network has a factory installed MAC address. It is a unique identifier for a network device. A company can set up a network so that only registered MAC Addresses can access it. It is possible to gain a MAC Address and "spoof" it to gain unauthorised access. This is why other authentication is essential to avoid this happening.
SOURCE RECOGNITION - PLEASE NOTE: The examination examples used in these walking talking mocks are samples from AQA from their non-confidential section of the public site. They also contain questions designed by TeachIT for AQA as part of the publicly available lesson materials.