0% found this document useful (0 votes)
5 views4 pages

Relucano Ias

The document is a final exam submission for Information Assurance and Security 2 by a student at the Polytechnic University of the Philippines. It covers key concepts such as IP addresses, MAC addresses, VPNs, firewalls, the OSI model, encryption, decryption, and multi-factor authentication, reflecting on their importance in network security. The student expresses a newfound understanding of these topics and their relevance to everyday digital interactions and security.

Uploaded by

vanessaolea737
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views4 pages

Relucano Ias

The document is a final exam submission for Information Assurance and Security 2 by a student at the Polytechnic University of the Philippines. It covers key concepts such as IP addresses, MAC addresses, VPNs, firewalls, the OSI model, encryption, decryption, and multi-factor authentication, reflecting on their importance in network security. The student expresses a newfound understanding of these topics and their relevance to everyday digital interactions and security.

Uploaded by

vanessaolea737
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Republic of the Philippines

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES


LOPEZ, QUEZON CAMPUS

Final Exam for


Information Assurance and Security 2

Submitted by:

2021-00792-LQ-0
Relucano John Andrey H.
BSIT 4-1

January 25, 2025

1
Republic of the Philippines
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES
LOPEZ, QUEZON CAMPUS

Table of Contents

IP (Internet Protocol) ................................................................................................................ 3

MAC (Media Access Control) ..................................................................................................... 3

VPN (Virtual Private Network) .................................................................................................... 3

Firewall ..................................................................................................................................... 4

OSI Model (Open Systems Interconnection Model) ......................................................................4

Encryption and Decryption ..........................................................................................................4

Multi-Factor Authentication (MFA)……………………………………………………………………………………………..4

Reflection

2
Republic of the Philippines
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES
LOPEZ, QUEZON CAMPUS

This semester, I’ve learned so much about how networks work and how data stays secure. These
concepts have not only taught me the technical side but also made me more aware of the systems
we rely on every day.

IP (Internet Protocol)

I’ve learned about IP addresses, which are like the digital addresses that help devices communicate
with each other. They make sure that data is sent to the right place. For example, when I visit a
website, my computer uses its IP address to connect to the site’s server and receive information. I
never realized how crucial IP addresses were in making the internet work so seamlessly. I have also
learned that there are two types of IP addresses:

 IPv4: This is the older type, and it uses numbers like 192.168.1.1. It’s been around for a long
time but is running out of space for all the new devices connected to the internet.

 IPv6: This is the newer version, and it uses longer numbers. It has a lot more room for
devices, so it can support the growing number of connected gadgets.

MAC (Media Access Control)

I found out that MAC addresses are unique identifiers assigned to a device’s network hardware. It’s
like a fingerprint for devices, and it ensures data reaches the correct one. For instance, when I send
something from my laptop to a printer, the MAC address makes sure it doesn’t accidentally go to
another device. This helped me see how local networks stay organized.

VPN (Virtual Private Network)

VPNs were something I had always heard about but never fully understood until now. I learned that
they encrypt data and hide my IP address, which is really helpful when using public Wi-Fi. Now I
understand how a VPN protects sensitive information, like passwords, from being intercepted. This
has made me more cautious about my online security, especially in public places.

Firewall

I’ve come to understand that a firewall acts like a security guard for a network, monitoring and
controlling incoming and outgoing traffic. For instance, if a hacker tries to access my device, the
firewall blocks them while still allowing safe traffic to pass through. This made me appreciate how
firewalls help protect not just personal computers but entire networks.

3
Republic of the Philippines
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES
LOPEZ, QUEZON CAMPUS

OSI Model (Open Systems Interconnection Model)

The OSI model was one of the most fascinating topics I learned. It breaks down how devices
communicate into seven layers, each with a specific job. At first, it felt overwhelming, but
understanding each layer helped me see how data travels from one device to another.

For example:

 The Physical Layer handles the hardware and connections like cables and Wi-Fi signals.

 The Data Link Layer ensures data reaches the correct device using MAC addresses.

 The Network Layer is where IP addresses guide data between networks.

 The Transport Layer guarantees reliable delivery, like downloading a file without errors.

 The Session Layer keeps connections stable, like during a video call.

 The Presentation Layer translates data into readable formats, like images or videos.

 The Application Layer is what I interact with, such as web browsers or email apps.

Encryption

Encryption is like locking up your information so that only the right person can open it. It turns
readable data into a code that no one can understand unless they have the “key” to unlock it. For
example, when you shop online, your credit card information is encrypted so hackers can’t see it
while it’s being sent to the website.

Decryption

Decryption is the process of unlocking the coded information so it becomes readable again. Only the
person or system with the correct “key” can turn the scrambled message back into its original form.

Multi-Factor Authentication (MFA)

MFA stood out to me as an important security feature. It requires more than just a password to log
in, like a code sent to your phone or a fingerprint scan. This adds an extra layer of protection. For
example, I realized how MFA makes it much harder for hackers to break into an account, even if they
manage to guess the password.

Overall, this semester has been an eye-opening experience. It helped me connect these concepts to
the real world and made me more conscious of how important security is in the digital age. I feel
more confident navigating and protecting my digital life now.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy