The Security Of Hardware Devices Computer Science Essay


This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Is short for Wired Equivalent Privacy, WEP is security protocol designed for wireless network to provide balance of security and privacy as wired network. WEP however are not secure as they are more vulnerable to corrupt, they do not offer end to end security because it's use of two lowest layers in the OSI model (the data link and physical layers)

Yet; Wired Equivalent Privacy encrypts vulnerable data between clients and access points over radio waves so that the data is protected while transmitting from one end point to another. Other security mechanism (Local Area Network) such end to end encryption, virtual private networks and password protection can later be put in to place in order to make sure there is privacy is the network.


Short for WI-Fi Protected Access, WPA is designed to improve data encryption through the temporal key integrity protocol; this security protocol offers better protection than WEP as its aims is to provide stronger wireless data encryption than WEP.

This security feature has its own disadvantage as its use of static encryption keys. For example when you set up a router with a WEP encryption key, that one key is used by every device on your network to encrypt every packet that's transmitted. In order to use WPA all devices on the network must be configured for WPA.


Stand for Wi-Fi Protected Access 2, this security protocol is designed to provide stronger data protection and network access control for wireless network. In order for authorized users to access to their wireless networks Wi-Fi Protected Access 2 give them a high level freedom.

WPA2 has two versions:

WPA2-Personal which protects unauthorized network access by utilizing a set-up password.

WPA2-Enterprise which verifies network users through a server. WPA2 is backward compatible with WPA.


Is stand for Wi-Fi Protected Access 2 - Pre-Shared Key, and also called WPA or WPA2 Personal. Its approach of securing a network using Wi-Fi Protected Access 2 with the use of authentication Pre-Shared Key, WPA2 PSK protects unauthorized network access by utilizing a set-up password as it was designed for home users without an enterprise authentication server. 


Firewall is a program that is designed to prevent uninvited users from accessing your computer, a firewall blocks unauthorized access to your computer and will send you alert u if the spyware that is already on your computer is sending information out.

Firewalls aims to provide is to build a protective barrier around computers that are connected to a network, so that only authorised programs can access data on a particular workstation. The user can control exactly which software Is allowed to pass data in and out of the system e.g. automatic update might be allowed for some installed software


Antivirus is a computer software used to identify computer viruses, it is created to protect against malware programs, which technically means avoid worms and Trojans. Antivirus software checks for intruders, it attempts to trace virus by spotting the virus signatures so therefore if the software detects a virus a pop-up screen may offer options: to quarantine the file i.e. move it so it can do no harm), to repair the file i.e. delete the virus but retain the file) or delete the file.

In addition; some antivirus software offer to create a rescue disk - a bootable disk that also contains antivirus software, if the virus infected the system, the system won't boot up however rescue disk may solve the problem.




A wired networked is term used to describe a computer that has physical wired connection between sender and receiver.

A wireless networked security is term used to describe a computer that has NO physical wired connection between sender and receiver instead it's used radio waves for connection.

Wired and Wireless network security both serve same purpose and they are very secure in the sense that their have encryptions on them.

Wired networks are faster and more secure than wireless networks then there's also difference between types of security WEP, WPA.

Installing wired networking is moderate difficulty where as installing wireless networking is easier.

Wireless network security is more expansive then wired network security.

Wireless LANs suffer a few more reliability problems than wired LANs because wireless communication signals travel through the air and can easily be intercepted.

Wired network has very good performance then wireless network also Mobility of wired networking is limited where as the wireless one is outstanding

Since wireless uses signal transmitted by radio waves others can see that you have a router and therefore many potential hackers might want to hack it

Wired systems can also have these attacks but the person has to be physically (hardwired).

Wireless networking utilizes specific equipment such as NICs, and routers in place of wires (copper or optical fiber) for connectivity.

Where as wired networking utilizes specific equipment such as Ethernet cables and network adapters. Although two computers can be directly wired to each other using an Ethernet crossover cable, wired LANs generally also require central devices like hubs, switches, or routers to accommodate more computers.

Task 2:- using the scenario above


Configure a networked device or specialist software to improve the security of a network

In this task I am going to implement security to the below plan by undertaking a full write up with a detailed diagram up including any evident that I might think could strengthen in this case 'how I can improved the network security'

The current authentication methods are that all IT personal are allowed in the server room via a keyboard on the door. Customers can access their accounts via the extranet and can access the usual bank pages via their internet. Roaming members of staff are able to log onto the network via a WAP point using a WEP key.


In the management room there two computers, scanner and fax machine which are all connect to a wireless network which is also connected to main server.


In the marketing there are three computers which are connected to the router then through a wireless network this room also share's internet connect with the publication room.


This room contains four computers and printer which are connected to the router then through a wireless network this room also share's internet connect with the marketing room.


The user is connected to email server this allows the user to access their email account through the wireless which is secured by the firewall which is also connected all servers in the network.

Server room Devices

Main Server

Server is a computer program which provides some service to other client programs via a network. Below are some of the servers I have used in my diagram.

Application server

A program that handles all application operations between users and an organization's backend business applications or databases, Application servers are typically used for complex transaction-based applications to support high-end needs

Email Server

Email server is a computer within a network that works as your virtual post office. Email server is where all the e-mail is stored for local users. In my diagram I have added email server in order for all the users in the firm to get access into their inbox.

Database server

A computer in a network that is dedicated to database storage and retrieval, it holds the database management system databases. Upon requests from the client machines, it searches the database for selected records and passes back the results. The term Database server it self implies a server that provides only database functions.

Web server

Web server is a computer program that delivers Web pages using the client/server model and the World Wide Web's Hypertext Transfer Protocol (HTTP ), serves the files that form Web pages to Web users.


Firewall is a program that is designed to prevent uninvited users from accessing your computer, a firewall blocks unauthorized access to your computer and will alert you if the spy ware that is already on your computer is sending information out.


Switch is small device that joins multiple computers together with local area network, technically network switches operate at layer 2 (data link layer) of OSI model. Switch strengthens line signals and enables internet traffic to different addresses depending on the information in the data packet.


Router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect. Router forwards data packets along networks.


A wireless networked security is term used to describe a computer that has NO physical wired connection between sender and receiver instead it's used radio waves for connection.


As it shows in my diagram it has eight computers, those two hardware devices allows the users to see their outputs. Desktop computer is a personal computer small enough to fit conveniently in an individual workspace. Those computers allow users to type documents, send email, and explore the internet as well as to store, retrieve.


is a device that is connected to one or more printers and shares a printer to a network, Printer is basically a printer that is physically attached to a network and it makes the printer available to other systems on the network this gives control over how much a user can print and who can print to which printer. Printer will give all the users in the firm to print their hard copy documents, business card etc

Fax machine

Fax machine is a device that sends and receives printed pages or images over telephone lines by converting them to and from electronic signals. I have added fax machine in Management in order to allow the firm users to send and receives printed pages or images over telephone lines.


Scanner is a device that captures images from photographic images such as photos, magazines, posters and similar sources for computer editing and display, scanners are mainly attach to personal computers with a Small Computer System Interface and they usually come with software, such as Adobe's Photoshop product, that let users resize and otherwise modify a captured image.

Writing Services

Essay Writing

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.