Passwords, encryption, anti-malware and firewalls - Network security - OCR - GCSE Computer Science Revision - OCR - BBC Bitesize (2024)

Passwords, encryption, anti-malware and firewalls

Secure passwords

The purpose of a password is to verify who a user is. Without knowing the password, you cannot use a user ID to sign into a network.

Unfortunately, many people have user IDs and passwords for many different situations so they do not easily remember them. They then choose simple, easy to remember passwords or use the same password for many situations.

Ideally, a secure password should be one that is not easy to guess, and that requires at least eight characters, including at least one uppercase letter, one number and one special character. This reduces the chances of someone easily working out what the password is. For example:

Additionally, the longer the password, the harder it is to work out:

“c0Mput3r$c!encE” is harder to guess than “computing”

Encryption

Encryption is the process of disguising data so that it cannot be understood. Even if a hacker gains access to encrypted data, they will not be able to understand it.

Network managers usually encrypt data which is to be stored or transmitted on a network.

Anti-malware

Anti-malware has three purposes:

  • to detect that has been installed
  • to prevent malware from being installed
  • to remove malware from the system

Anti-malware includes anti-virus software, anti-phishing tools and anti-spyware software. It works by scanning through all the files on a computer and checking them against a list (known as definitions) of known malware.

The main problem with anti-malware is that it is reactive - it can only detect, prevent and remove known malware. When new malware is introduced, anti-malware has to be updated to take account of the new threats. The longer the gap before anti-malware is updated, the less protection it offers.

Firewalls

A firewall is a tool that monitors traffic going into and out of a computer or network, and either allows the traffic to pass through or blocks it.

The decision to allow or block is based on rules, known as the firewall policy. For example, some programs, such as email clients and web browsers have legitimate cause to send a . These programs are known and the firewall policy allows their communications. However, any transmissions that are not sent from or to known - and allowed - sources are blocked.

Firewalls can be or software-based. Hardware firewalls tend to be more expensive, but are more effective.

Passwords, encryption, anti-malware and firewalls - Network security - OCR - GCSE Computer Science Revision - OCR - BBC Bitesize (2024)
Top Articles
Dig Out Your Loose Change. It’s Time to Turn It Into Cash Money.
Going Cashless: What Can We Learn from Sweden’s Experience?
WALB Locker Room Report Week 5 2024
Lifebridge Healthstream
Top Scorers Transfermarkt
Boomerang Media Group: Quality Media Solutions
360 Training Alcohol Final Exam Answers
Trade Chart Dave Richard
Steve Strange - From Punk To New Romantic
Amateur Lesbian Spanking
OnTrigger Enter, Exit ...
Southland Goldendoodles
Hello Alice Business Credit Card Limit Hard Pull
Craigslist Greenville Craigslist
Wisconsin Women's Volleyball Team Leaked Pictures
Jang Urdu Today
Georgetown 10 Day Weather
18889183540
U Of Arizona Phonebook
Loslaten met de Sedona methode
6892697335
In hunt for cartel hitmen, Texas Ranger's biggest obstacle may be the border itself (2024)
Best Restaurants Ventnor
Downloahub
Robert A McDougal: XPP Tutorial
Ilabs Ucsf
Que Si Que Si Que No Que No Lyrics
60 Second Burger Run Unblocked
RUB MASSAGE AUSTIN
How to Watch the X Trilogy Starring Mia Goth in Chronological Order
Santa Cruz California Craigslist
Laurin Funeral Home | Buried In Work
Midsouthshooters Supply
Gets Less Antsy Crossword Clue
Enjoy4Fun Uno
Heelyqutii
Telugu Moviez Wap Org
Adam Bartley Net Worth
15 Best Things to Do in Roseville (CA) - The Crazy Tourist
Davis Fire Friday live updates: Community meeting set for 7 p.m. with Lombardo
Bob And Jeff's Monticello Fl
Bekah Birdsall Measurements
Www Craigslist Com Atlanta Ga
Dagelijkse hooikoortsradar: deze pollen zitten nu in de lucht
Bridgeport Police Blotter Today
Dobratz Hantge Funeral Chapel Obituaries
Rovert Wrestling
15:30 Est
sin city jili
Service Changes and Self-Service Options
2121 Gateway Point
Latest Posts
Article information

Author: Arielle Torp

Last Updated:

Views: 5406

Rating: 4 / 5 (41 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Arielle Torp

Birthday: 1997-09-20

Address: 87313 Erdman Vista, North Dustinborough, WA 37563

Phone: +97216742823598

Job: Central Technology Officer

Hobby: Taekwondo, Macrame, Foreign language learning, Kite flying, Cooking, Skiing, Computer programming

Introduction: My name is Arielle Torp, I am a comfortable, kind, zealous, lovely, jolly, colorful, adventurous person who loves writing and wants to share my knowledge and understanding with you.