Logout

Home Topic 3 Last Next

3.1.16

Evaluate the advantages and disadvantages of each method of network security.

 

Teaching Note:


 

Sample Question:

sdfsdfsf

JSR Notes:

1. Authentication with Accounts/Passwords/Biometrics

Strengths

 

Vulnerabilities/Weaknesses - the same thing that makes user ID/password systems strong, can make them weak.

 

1B. Permissions

(Again, probably not focused on with this assessment statement.)

Strengths

Vulnerabilities/Weaknesses

Here's an image that gives you a visual of how permissions can be very error prone. This is a screenshot of doing a "Permissions Check" on older versions of the Mac, and sure enough most times you ran this, there were multiple permissions which had gotten corrupted/changed.

Permissions problem

 

2. Trusted Media Access Control (MAC) addresses

Strengths


Vulnerabilities/Weaknesses

 

3. Encryption

Remember that encryption is particularly important for wireless networks, in which it is easy to "pick out of the air" the communication. And recall also that VPN technology relies on strong encryption, along with tunneling technology.

Strengths


Vulnerabilities/Weaknesses


WPA-specific
Encryption:

 

4. Firewalls

Note that firewalls can be relatively basic software solutions, all the way up to sophisticated hardware solutions. The relative strengths and weaknesses of a particular solution are primarily influenced by the type of firewall they are.

Strengths


Vulnerabilities/Weaknesses