Methods of Securing a Network (Edexcel IGCSE ICT)

Revision Note

Robert Hampton

Written by: Robert Hampton

Reviewed by: James Woodhouse

Usernames & Passwords

How does a password help?

  • Passwords are a digital lock to prevent unauthorised access to an account

  • Passwords are used to authenticate a user to the network

  • They are often stored as an encrypted/ciphered text entry in a database, ensuring that even with unauthorised access to a database, a hacker would not be able to gain access to the individual passwords of users

  • Strong passwords and regular password changes are important to maintain security

image-1-

Firewalls

What is a firewall?

  • A firewall is a barrier between a network and the internet

  • A firewall prevents unwanted traffic from entering a network by filtering requests to ensure they are legitimate

  • It can be both hardware and software and they are often used together to provide stronger security to a network

    • Hardware firewalls will protect the whole network and prevent unauthorised traffic

    • Software firewalls will protect the individual devices on the network, monitoring the data going to and from each computer

Encryption

What is encryption?

  • Encryption is a method of scrambling data so that unauthorised users cannot understand it

  • Encryption methods use 'keys', which are specialised programs designed to scramble or unscramble data

  • Encryption uses complex mathematical algorithms to scramble the data

  • There are two common methods of encryption:

    • Symmetric

    • Public key

Symmetric encryption

  • The sender uses a key to encrypt the data before transmission

  • The receiver uses the same key to decrypt the data

  • It's usually faster, making it ideal for encrypting large amounts of data

  • The significant downside is the challenge of securely sharing this key between the sender and receiver

  • If an unauthorised user captures the key, they can decrypt all messages intercepted in transmission

Image showing the structure of symmetric encryption
Structure of Symmetric Encryption

Public key encryption

  • Public key encryption uses two keys:

    • a public key for encryption

    • and a private key for decryption

  • Receivers openly share their public key

  • Senders use this public key to encrypt the data

  • The receiver's private key is the only key that can decrypt the data and is kept locally on their side

  • The public and private keys are created at the same time and are designed to work together in this way

  • It is typically slower than symmetric encryption

  • It is generally used for more secure and smaller data transactions, e.g. passwords, bank details

Image showing the structure of public key encryption
Structure of Public Key Encryption

WEP/WPA

What is WEP?

  • Wireless Encryption Protocol (WEP) is a method of encrypting data being transmitted on a wireless network

  • Each device on the network uses the same key to encrypt and decrypt data

  • It is a less secure encryption method due to all devices on the network sharing the same key

  • Eavesdropping software (packet sniffers) can be used to intercept data packets and identify the key

What is WPA?

  • Wi-fi Protected Access (WPA) is a more secure method of encrypting data being transmitted on a wireless network

  • Each device connected to the network receives a different key

  • New keys are used for every packet transmitted on the network

Virtual private networks (VPN)

What is a VPN?

  • A VPN allows users to remotely connect to private local area networks (LANs)

  • All data sent and received using a VPN is encrypted

  • Common uses of a VPN include:

    • Remotely accessing a companies network (working from home)

    • Making secure payments

    • Hiding web activities

    • Bypassing geolocation rights management or online censorship

File access rights

What are file access rights?

  • File access rights can be set to determine different levels of access to specific files/folders

  • Examples of file permissions include:

    • Read - can read the contents of a file only

    • Write - can make changes to file contents and/or create new files

    • Delete - can delete files

    • Execute - can run applications/launch software

Transaction logs & backups

What is a transaction log?

  • A transaction log is a secure file on a network that keeps a record of every action performed by devices on a network

  • Transactions logs include:

    • Device & data access

    • Timestamps

    • User IDs

    • Successful/failed login attempts

  • Transaction logs don't directly protect a network, they help administrators monitor any identify any unusual activity

  • Backups are another indirect method of protecting a network

  • Keeping copies of data in a secure place on the network in the event of a data breach/loss

Worked Example

Describe one method that could be used to secure payment data transferred between a server and other computers

[3]

Answer

A description to include three linked points:

  • Encryption [1] encodes/scrambles data / makes data unreadable [1] using a key [1]

Last updated:

You've read 0 of your 5 free revision notes this week

Sign up now. It’s free!

Join the 100,000+ Students that ❤️ Save My Exams

the (exam) results speak for themselves:

Did this page help you?

Robert Hampton

Author: Robert Hampton

Expertise: Computer Science Content Creator

Rob has over 16 years' experience teaching Computer Science and ICT at KS3 & GCSE levels. Rob has demonstrated strong leadership as Head of Department since 2012 and previously supported teacher development as a Specialist Leader of Education, empowering departments to excel in Computer Science. Beyond his tech expertise, Robert embraces the virtual world as an avid gamer, conquering digital battlefields when he's not coding.

James Woodhouse

Author: James Woodhouse

Expertise: Computer Science

James graduated from the University of Sunderland with a degree in ICT and Computing education. He has over 14 years of experience both teaching and leading in Computer Science, specialising in teaching GCSE and A-level. James has held various leadership roles, including Head of Computer Science and coordinator positions for Key Stage 3 and Key Stage 4. James has a keen interest in networking security and technologies aimed at preventing security breaches.