TopMyGrade

GCSE/Computer Science/AQA

CS5.5Network security: encryption (asymmetric and symmetric), firewalls, MAC address filtering and authentication; layers of defence

Notes

Network security

Networks are useful because they share data — and dangerous for the same reason. Without security, attackers can eavesdrop, impersonate or disrupt. AQA's GCSE focuses on encryption, firewalls, MAC address filtering and authentication as layers of defence.

Encryption

Encryption converts readable data (plaintext) into unreadable form (ciphertext) using a key. The receiver decrypts using the corresponding key.

Symmetric encryption

  • Same key used to encrypt and decrypt.
  • Fast, well-suited to bulk data.
  • Challenge: how do both parties get the key without an attacker intercepting it?

Asymmetric encryption

  • A pair of keys: public (shared openly) and private (kept secret).
  • Anyone can encrypt a message with the public key; only the holder of the private key can decrypt.
  • Used to securely exchange a symmetric key, then bulk data uses symmetric.
  • Slower than symmetric; usually combined with it.

This combination is the basis of HTTPS / TLS.

Firewalls

A firewall is software or hardware that filters network traffic based on rules. Sits between trusted (LAN) and untrusted (internet) networks.

What firewalls do:

  • Allow or block traffic based on source/destination, port, protocol.
  • Block known malicious patterns.
  • Hide internal network from outside scans (NAT).
  • Log suspicious activity.

Firewalls are not magic — they don't stop attacks that come through allowed traffic (e.g. a phishing email).

MAC address filtering

Every network adapter has a unique MAC (Media Access Control) address — six pairs of hex digits like 00:1A:2B:3C:4D:5E.

A router or access point can be configured to only allow listed MAC addresses to connect. Unlisted devices are blocked.

Limitation: MAC addresses can be spoofed (attacker changes their adapter's MAC to a known-allowed one). MAC filtering is a useful deterrent, not a strong defence on its own.

Authentication

Authentication verifies a user is who they claim to be. Methods:

  • Password — something you know. Strong if long and unique.
  • Two-factor authentication (2FA) — something you have (phone, key) plus a password.
  • Biometrics — something you are (fingerprint, face).
  • Certificates — cryptographic credentials proving identity.

Strong authentication is the first line of defence against unauthorised access.

Layers of defence (defence in depth)

No single measure is perfect. Real networks layer them:

  1. Physical — locked server room, locked cables.
  2. Network — firewall, VPN, MAC filtering.
  3. Transport — encryption (TLS/HTTPS).
  4. Authentication — strong passwords, 2FA, biometrics.
  5. Authorisation — only allow each user/process to do what they need (least privilege).
  6. Monitoring — logs, intrusion-detection systems.
  7. User education — recognising phishing, safe browsing.

If one layer fails, others catch the attacker. No layer is a substitute for all the others.

Worked example

A small business sets up a Wi-Fi network. List four security measures.

  1. Encryption — WPA3 or WPA2 with strong passphrase.
  2. MAC filtering — only allow staff laptops.
  3. Firewall — block unsolicited inbound traffic.
  4. Authentication — staff log in with username and password to their PCs and accounts.

Add 2FA for cloud services for additional defence.

Common mistakesPitfalls

  1. Calling MAC filtering "secure". It's a deterrent — easily bypassed by a determined attacker.
  2. Assuming HTTPS = total security. HTTPS protects the channel; the website itself can still be malicious.
  3. Treating firewalls as preventing all attacks. Firewalls allow approved traffic — phishing/malware in approved channels still gets through.
  4. Using one defence and stopping. Defence-in-depth requires multiple complementary layers.
  5. Confusing authentication with authorisation. Authentication = "who are you?" Authorisation = "what can you do?".

Try thisQuick check

For each measure, state what kind of attack it primarily defends against:

  • Encryption: eavesdropping / interception.
  • Firewall: unauthorised inbound connections.
  • MAC filtering: casual / unauthorised devices joining the network.
  • Authentication: impersonation / unauthorised login.
  • 2FA: password theft / phishing.

AI-generated · claude-opus-4-7 · v3-deep-computer-science

Practice questions

Try each before peeking at the worked solution.

  1. Question 14 marks

    Encryption purpose

    Explain the purpose of encryption in network security.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  2. Question 24 marks

    Symmetric vs asymmetric

    Compare symmetric and asymmetric encryption.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  3. Question 34 marks

    Firewall

    Describe the role of a firewall in a network.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  4. Question 44 marks

    MAC filtering limit

    Explain how MAC address filtering works and why it is not a strong security measure on its own.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  5. Question 55 marks

    Defence in depth

    Explain the principle of defence in depth with an example of three measures a school might combine.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  6. Question 63 marks

    Authentication vs authorisation

    State the difference between authentication and authorisation.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  7. Question 73 marks

    When HTTPS isn't enough

    A user accesses a phishing website over HTTPS. Explain why HTTPS does not protect them.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

Flashcards

CS5.5 — Network security — encryption, firewalls, MAC filtering, authentication

12-card SR deck for AQA GCSE Computer Science topic CS5.5

12 cards · spaced repetition (SM-2)