Methods of Protecting Networks (Edexcel GCSE Computer Science)

Revision Note

Access Control

What are access controls?

  • Access controls ensure users of a network can access what they need to access and do not have access to information/resources they shouldn't

  • Users can have designated roles on a network

  • Some examples of different levels of access to a school network include

    • Administrators: Unrestricted - Can access all areas of the network

    • Teaching Staff: Partially restricted - Can access all student data but cannot access other staff members' data

    • Students: Restricted - Can only access their own data and files

  • Users and groups of users can be given specific file permissions

What are file permissions?

  • File permissions can be set to determine different levels of access to specific files/folders

  • Examples of file permissions include:

    • Read - can read the contents of a file only

    • Write - can make changes to file contents and/or create new files

    • Delete - can delete files

    • Execute - can run applications/launch software

What is authentication?

  • Authentication is the process of ensuring that a system is secure by asking the user to complete tasks to prove they are an authorised user of the system

  • Authentication is done because bots can submit data in online forms

  • Authentication can be done in several ways, these include

    • Usernames and passwords

    • Multi-factor authentication

    • CAPTCHA - see example below

authentication-recaptcha

Physical Security

What is physical security?

  • Physical security is a method of physically preventing access to any part of a network

  • There are a range of physical security measures that can be implemented on a network

    • Locked doors: Preventing access to server rooms and cabinets of switches

    • Biometrics: Fingerprint scanners, facial recognition and retinal scans 

    • Surveillance Cameras: Monitoring the activity around the site where crucial networking hardware is located

What form of attack would this prevent?

  • Data interception and theft

  • Social engineering

Firewalls

What is a firewall?

  • A firewall monitors incoming and outgoing network traffic and uses a set of rules to determine which traffic to allow

  • A firewall prevents unwanted traffic from entering a network by filtering requests to ensure they are legitimate

  • It can be both hardware and software and they are often used together to provide stronger security to a network

    • Hardware firewalls will protect the whole network and prevent unauthorised traffic

    • Software firewalls will protect the individual devices on the network, monitoring the data going to and from each computer

What form of attack would this prevent?

  • Hackers

  • Malware

  • Unauthorised Access to a Network

Worked Example

Describe how a firewall protects a local area network (LAN) [2]

Answer

A description to include two from:

  • Monitors/checks traffic (1) using a set of rules / list of authorised/unauthorised computers/addresses/protocols (1) to decide if data is allowed into or out of the network (1)

Last updated:

You've read 0 of your 10 free revision notes

Unlock more, it's free!

Join the 100,000+ Students that ❤️ Save My Exams

the (exam) results speak for themselves:

Did this page help you?

Robert Hampton

Author: Robert Hampton

Expertise: Computer Science Content Creator

Rob has over 16 years' experience teaching Computer Science and ICT at KS3 & GCSE levels. Rob has demonstrated strong leadership as Head of Department since 2012 and previously supported teacher development as a Specialist Leader of Education, empowering departments to excel in Computer Science. Beyond his tech expertise, Robert embraces the virtual world as an avid gamer, conquering digital battlefields when he's not coding.

James Woodhouse

Author: James Woodhouse

Expertise: Computer Science

James graduated from the University of Sunderland with a degree in ICT and Computing education. He has over 14 years of experience both teaching and leading in Computer Science, specialising in teaching GCSE and A-level. James has held various leadership roles, including Head of Computer Science and coordinator positions for Key Stage 3 and Key Stage 4. James has a keen interest in networking security and technologies aimed at preventing security breaches.