Network topologies, protocols and layers - AQANetwork security

Networks can be arranged in different topologies. Encryption is used to ensure that messages can be sent securely over a network.

Part ofComputer ScienceTheoretical knowledge

Network security

Authentication

In order to access a , it is important that the user has permission to see and use the on the network. Whether the network is for home or business purposes, it is likely that sensitive data is held on one or more connected devices, and there are a number of ways that this can be protected.

is the process of a user confirming that they are who they say they are on a computer system. In a network, this is often done through inputting a username and password. For networks that require high levels of security, this may include other factors.

The factors of authentication can be broken down into three main groups:

  • something you are - username, bank account number, or anything that identifies the user uniquely
  • something you know - password, pin, secret answer to a question
  • something you have - swipe card, , any other physical identifying device

These are known as the three factors of authentication and can be combined in any order to create a secure login to a system. Read more about this in the fundamentals of cyber security study guide.

Encryption

is the process of disguising a message so that it cannot be understood by anyone but its intended recipient. Encryption requires the use of a key. The key is secret as to how the message has been disguised.

Five facts about encryption

Unencrypted messages are referred to as messages and encrypted messages are known as .

A simple method of encryption requires the use of a technique known as the works by giving a number value to a key. Each plaintext letter is replaced by a new letter, the one found at the original letter's position in the alphabet plus the value of the key.

For example, a key value of 3 would change the plaintext message “see you tonight” to the ciphertext message “vhh brx wrqljkw”.

A table containing plaintext and an example ciphertext

To decrypt the message, the process is reversed.

Although this is a good example of encryption, much more complicated are used to encrypt messages today.

Firewalls

A is that blocks unexpected connections coming into or out of a network. Most operating systems include a firewall as a piece of software, but firewalls can also be devices that sit alongside or as part of the .

Firewalls use ports which only allow specific data into and out of networks. The network manager is able to open or close the ports depending on the type of traffic they want to use for the network. By keeping more ports closed on a firewall, less internet traffic can come through, making the network more secure.

A firewall with open ports allowing data into a network and closed ports preventing data from entering a network

MAC address filtering

Because a device's is unique to the device, the network manager can create a more secure network by using this address to limit the devices on the network.

They have two options to do this:

  • A - only the device addresses on the list are allowed to access the network. This is more secure, but creates extra work for the network manager as they must add data every time a new device needs to join the network.
  • A - devices on the list are banned from the network. This is less secure than a whitelist, but is easier to maintain.