Y12 Unit 0 - Class Structure
Y12 Unit 1 - Computational Thinking
Y12 Unit 2 - Networks
Y12 Unit 3 - OOP
Y12 Unit 4 - System Fundamentals
Abstract Data Structures (HL) Year 13 Unit

Network Security

IB Standards Covered:

3.1.15 Describe different methods of wireless network security
3.1.16 Discuss the advantages and disadvantages of each network security method

There are a variety of ways in which you can keep your network secure. The chart below provides an overview of the advantages and disadvantages of each method.

AdvantagesDisadvantages
Install an antivirus
program on your device.
Provides protection from
malicious downloaded
files.
May slow down your device
Use a software firewall
installed on each device.
It will monitor and control
the traffic flow between your
computer and the network
and prevent unauthorized
access to your device.
May slow down your device
Limit access to wireless
devices by MAC address
Extra security by having
a whitelist of allowed
devices.
Each device has a
unique MAC address
found on the Network
Interface Card(NIC)
The list can easily be
sniffed with appropriate
software.
The list may be hard to
manage.
WEP Wireless SecurityWorks with legacy systemsOutdated and not secure.
WPA/WPA2 Wireless
Security
The best and most
recommended option.
Wireless Protected
Setup
Easy to use as no
passwords are needed.
Only works with WPS
certified devices.
There are some known
security issues.
Use a firewallPrevent attackers from
accessing your network over
the internet.
Physical proximity will allow
access to the network.
Encryption software for
information being sent over
the internet.
Very difficult to decrypt,
making it very secure.
The process can be a bit complicated.