| Feature | Symmetric Encryption | Asymmetric Encryption |
|---|---|---|
| Key Usage | Uses the same key for both encryption and decryption. | Uses a public key for encryption and a private key for decryption. |
| Speed | Generally faster and more efficient for large data sets. | Slower due to complex mathematical computations. |
| Key Exchange | Requires a secure way to share the secret key. | Public keys can be shared openly; private keys are kept secret. |
Hardware vs. Software Firewalls: Hardware firewalls are dedicated physical devices that protect an entire network perimeter, while software firewalls are applications installed on individual hosts to protect specific devices.
White Listing vs. Black Listing: White listing is a restrictive approach that blocks everything by default except for known safe entities, whereas black listing allows everything except for known threats.
Identify the Goal: When asked to choose a security measure, first determine if the goal is to protect data in transit (encryption), verify identity (authentication), or control traffic flow (firewalls).
Evaluate Scenarios: If a scenario involves preventing unauthorized devices from joining a Wi-Fi network, look for MAC address filtering or WPA3 encryption as primary answers.
Check for Multi-Factor: Always consider if a single method (like a password) is sufficient. Exams often reward identifying that Multi-Factor Authentication (MFA) provides significantly higher security.
Sanity Check: Ensure the proposed solution matches the scale. A software firewall is appropriate for a laptop, but a hardware firewall is necessary for a corporate gateway.
Security is a Product: A common mistake is believing that buying a firewall makes a network "secure." Security is a continuous process involving regular updates, monitoring, and user education.
Internal Threats: Many organizations focus exclusively on external hackers, but internal threats (disgruntled employees or accidental data leaks) are equally dangerous and require internal controls.
Encryption is Invincible: While encryption protects data confidentiality, it does not prevent data from being deleted or the network from being overwhelmed by a Denial of Service (DoS) attack.