Ch 7: Network Authentication

About This Chapter

If you need some help preparing for an upcoming exam or to get through your computer science homework, take a look at this engaging chapter on network authentication. Feel free to access these short lessons and self-assessment quizzes on any smartphone, tablet or computer 24 hours a day.

Network Authentication - Chapter Summary

You can work at your own pace as you study the lessons on network authentication in this chapter. Subjects covered include access control matrices, biometric security, network access protection (NAP) and smart cards. Each lesson is accompanied by a short quiz you can use to assess your knowledge of these concepts. Help from one of our experts is available in the Dashboard if you have questions. Once you finish this chapter, you should be able to do the following:

  • Detail the processes involved in capturing network traffic
  • List the types and functions of network interface cards (NIC)
  • Explain the function of a domain controller
  • Outline Kerberos encryption types
  • Identify different types of virtual private networks (VPNs)
  • Discuss the protocols and types of VPN encryption
  • Describe the solutions and devices of a security perimeter
  • Compare information and data dissemination
  • Differentiate between different types of risk and their contingency plans
  • Outline IT disaster and recovery plans

14 Lessons in Chapter 7: Network Authentication
Test your knowledge with a 30-question chapter practice test
Access Control Matrix: Model & Example

1. Access Control Matrix: Model & Example

An access control matrix is a single digital file assigning users and files different levels of security. We'll talk about access control models including: mandatory access, role-based access, discretionary access, and rule-based access.

What is Biometric Security? - Definition, Systems & Devices

2. What is Biometric Security? - Definition, Systems & Devices

Biometric security devices measure unique characteristics of a person, such as voice pattern, the iris or retina pattern of the eye, or fingerprint patterns. With biometrics, it can be extremely difficult for someone to break into a system.

What is Network Access Protection (NAP)?

3. What is Network Access Protection (NAP)?

In this lesson,we will be examining the vulnerabilities posed to a corporate network by remote connections and understand the role of Network Access Protection in remote authorised connections.

Smart Cards: Definition, Uses & Examples

4. Smart Cards: Definition, Uses & Examples

Smart cards offer a slightly different way to pay for your purchases, while protecting your valuable personal information. In this lesson, you'll learn more about smart cards and how they're used.

Capturing Network Traffic: Definition & Processes

5. Capturing Network Traffic: Definition & Processes

When talking about computers or the internet you must have heard the term network traffic. What exactly is network traffic? How can you monitor and filter it? In this lesson we will learn some of the basic concepts of network traffic.

Network Interface Card (NIC): Types, Function & Definition

6. Network Interface Card (NIC): Types, Function & Definition

To connect to a network, a computer uses a network interface card (NIC). A NIC controls the wired and wireless connections of a computer to exchange information with other computers and the Internet.

What is a Domain Controller? - Definition & Function

7. What is a Domain Controller? - Definition & Function

In today's digital world, everything has a password. You need a password to access your computer and shared resources at work. In this lesson, we'll learn about managing passwords in a networked environment through the use of domain controllers.

Kerberos Encryption Types

8. Kerberos Encryption Types

Security is important in today's world. Events such as the Olympics bring it front and center. In this lesson, we'll take a look at Kerberos Encryption and the encryption types associated with it.

What Is a Virtual Private Network (VPN)? - Definition & Types

9. What Is a Virtual Private Network (VPN)? - Definition & Types

A virtual private network (VPN) provides a way to use network resources securely in a remote manner. In this lesson, we'll cover why we use VPNs, what types of VPNs are used, and what is necessary in order for VPNs to work.

VPN Encryption: Types & Protocols

10. VPN Encryption: Types & Protocols

VPN (Virtual Private Network) encryption is used to ensure secure communications over data networks. In this lesson, we'll look at some of the different protocols that make up a VPN and the types of encryption that are used within a VPN.

Security Perimeter: Definition, Solutions & Devices

11. Security Perimeter: Definition, Solutions & Devices

In this lesson, you will learn the definition of security perimeter. Additionally, you will learn about the devices, equipment, and technologies used to secure a network's perimeter.

Intranet and Extranet: Comparing Information and Data Dissemination

12. Intranet and Extranet: Comparing Information and Data Dissemination

Organizations rely upon intranets and extranets to share information, communicate with employees, suppliers and customers, and enable collaboration on projects. This lesson explains how intranets and extranets work. It introduces the topics of virtual private networks, tunneling and firewalls.

Types of Risk & Creating Contingency Plans

13. Types of Risk & Creating Contingency Plans

This lesson discusses various types of risk, including variance, contingency risk, and unknowns. We also explore the need for a risk contingency plan for each project that a company undertakes.

IT Disaster Planning & Recovery

14. IT Disaster Planning & Recovery

In this lesson we will learn about Disaster Recovery Plans (DRP) for recovering data and infrastructure in case of an Information Technology (IT) system failure.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support