Firewalls: A firewall acts as a critical barrier between a trusted internal network and an untrusted external network like the internet. It examines incoming and outgoing traffic against a set of security rules to block unauthorized requests while allowing legitimate communication.
Anti-virus and Anti-spyware: These software tools are designed to detect, quarantine, and remove malicious code. Anti-virus software typically uses a database of known malware 'signatures' to identify threats, while anti-spyware specifically targets programs that secretly monitor user behavior or record keystrokes.
WPA2 Protocol: In wireless environments, security is maintained through protocols like , which uses a master key derived from the network name (SSID) and password. This ensures that data transmitted over radio waves is encrypted and cannot be easily intercepted by nearby eavesdroppers.
Symmetric Encryption: This method uses a single, identical key for both the encryption of plaintext and the decryption of ciphertext. It is highly efficient for processing large volumes of data, but it requires a secure method for sharing the key between the sender and receiver.
Asymmetric Encryption: Also known as public-key cryptography, this uses a pair of mathematically related keys: a public key for encryption and a private key for decryption. This eliminates the need to share a secret key, making it much more secure for communication over open networks like the internet.
| Feature | Symmetric Encryption | Asymmetric Encryption |
|---|---|---|
| Key Usage | One shared key for both tasks | Public key to encrypt, Private to decrypt |
| Speed | Fast; suitable for bulk data | Slower; computationally intensive |
| Security | Risk in key distribution | High; private key is never shared |
Security vs. Integrity: While security focuses on keeping data away from unauthorized eyes, integrity focuses on ensuring that the data those eyes see is actually correct and has not been tampered with.
Hardware vs. Software Firewalls: Hardware firewalls protect an entire network at the gateway level, whereas software firewalls are installed on individual devices to monitor specific application traffic.
Keyword Matching: When a question mentions 'accuracy' or 'unaltered,' focus your answer on Data Integrity. If it mentions 'consent' or 'rights,' focus on Data Privacy.
Encryption Logic: Always remember that in asymmetric encryption, the sender uses the receiver's public key. The receiver is the only one who can decrypt it using their own private key.
Multi-factor Context: If asked how to improve security, suggest combining measures (e.g., Biometrics + Passwords) rather than just strengthening one, as this creates 'defense in depth.'
Common Error: Do not confuse anti-virus with firewalls. A firewall blocks unauthorized access (traffic), while anti-virus deals with malicious files already attempting to run on the system.