Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Network security

Firewalls

A firewall is installed on a network to only allow know


computers to have access.
This is usually a program, but sometimes hardware device
that filters the data coming through the internet connection.
Anyone outside the network wont be able to access the
network.

Authentication techniques
These are used to check that a person accessing a network or a
system is genuinely the person in question.
Examples are:
Username and password (you must have both)
Digital signatures
Biometrics (using your finger print)
Magnetic stripe card/ID card
PIN numbers
1. What is a username and why must it be unique?
An identification used by a person with access to a computer,
network, or online service.
2. What is a password?
A secret word or phrase that must be used to gain admission to a place or
a string of characters that allows access to a computer, interface, or
system.

3. Write down 4 characteristics of a good password.


English Upper Case
English Lower Case
Numerals
Non-Alphanumeric (Punctuation marks and other symbols)
4. Write down 3 things to consider when using a password
Passwords MUST be at least 6 characters long
Passwords MAY NOT contain your username or any part of your full
name

Passwords MUST contain characters from at least three of the four


class characteristics, which are listed below.

You might also like