3.1.12
Outline the advantages of wireless networking
3.1.12
Outline the disadvantages of wireless networking
3.1.13
Describe NICs
They are hardware components installed in devices which allow them to connect to a network. It allows the device to send and receive data over the network.
3.1.13
Describe wireless access points
Allows wireless devices to connect to a network.
3.1.13
Describe wireless routers
A wireless router serves as a central hub for multiple devices to connect and communicate within a network. It also manages data traffic within a network, forwarding and routing data packets.
3.1.13
Describe the software components of a wireless network
Antivirus software: Detects and removes viruses that can compromise the network.
Firewall software: Monitors and filters incoming and outgoing network traffic, ensuring that only data which meets its set of rules get to access the network.
WLAN protocols: Defines the rules and standards for wireless communication. They specify how data is transmitted, received, and organized into packets.
3.1.14
Describe WiMAX
WiMAX stands for Worldwide Interoperability for Microwave Access. It is a wireless communication technology which uses microwave radio waves to provide access to the internet. It is designed as a cheap method which covers a large area. However, it is slower than Wi-Fi.
3.1.14
Describe 3G mobile networking
3G (third generation) mobile networking is a mobile networking standard for data transmission. It is rather slow.
3.1.14
Describe 4G mobile networking
4G (fourth generation) mobile networking is a mobile networking standard which is an upgrade to 3G. With 4G, people could easily watch videos, make videos, and use apps that needed a lot of data.
3.1.15
Describe three factor authentication
Three factor authentication typically falls into three categories:
Something you know (Knowledge-based): Passwords, PIN (personal identification number), Security questions (e.g. What is your son in law’s middle name?)
Something you have (possession-based): Keys, identity cards, authentication code sent to mobile device
Something you are (biometric-based): fingerprints, facial recognition, iris scan
It is often used to ensure people accessing networks are authorised.
3.1.15
Describe firewalls
Firewalls are hardware or software (or both) which monitors and filters incoming and out-going network traffic (data packets). They do so by implementing a set of rules and policies that determine which data packets are allowed to pass through and which should be blocked or filtered.
3.1.15
Describe MAC addresses
Media Access Control (MAC) addresses are unique identifiers assigned to network devices. With MAC addresses, network administators can create Access Control Lists (ACLs) that allow or deny network access for specific devices.
3.1.15
Describe physical security as a method of network security
You can protect network infrastructure with locked doors, security guards, reinforced rooms, CCTV, etc.
3.1.15
Describe encryption
Encryption is the process of converting data into a coded format to prevent unauthorized access, making it readable only to those with the proper decryption key or algorithm.
3.1.16
Evaluate encryption
Advantages:
* Encryption prevents data from being read by unauthorised individuals
* Encryption ensures data integrity
Disadvantages:
* If different systems or applications use different encryption methods, compatibility issues may arise. This could be an issue in business mergers.
* Losing encryption keys can result in permanent data loss
3.1.16
Evaluate MAC addresses
Advantages:
* MAC addresses allow networks to identify devices in a network.
* It also allows certain devices to be whitelisted or blacklisted from a network so access can be restricted.
Disadvantages:
* The whitelist has to be amended every time a device is switched
* Malicious attackers could gain access to an whitelisted device and gain access to the network. (MAC addresses only identify the device, not who is using it)