The mistakes students make every single year. Bookmark this page.
| # | What students write โ | What you should write โ |
|---|---|---|
| 1 | "A router and a switch are the same thing" | Router connects DIFFERENT networks (your home to the internet). Switch connects devices WITHIN one network. |
| 2 | "HTTPS encrypts the website" | HTTPS encrypts the data IN TRANSIT between your browser and the server. The website itself is unchanged. |
| 3 | "A firewall stops viruses" | A firewall filters NETWORK TRAFFIC based on rules. Antivirus stops malware. Different jobs. |
| 4 | "VPN makes you anonymous" | A VPN encrypts your traffic and hides it from your ISP/local network. The VPN provider can still see it. Not full anonymity. |
| 5 | "DDoS = hacking the website" | DDoS doesn't break in. It overwhelms the server with so much traffic that real users can't connect. Availability attack, not confidentiality. |
| 6 | "Phishing is when someone hacks your email" | Phishing is TRICKING you into giving up info via a fake message. No hacking required โ it's social engineering. |
| 7 | "Symmetric encryption is less secure than asymmetric" | Both are secure. Symmetric is FASTER but needs secure key sharing. Asymmetric solves key sharing but is SLOWER. HTTPS uses both. |
| 8 | "Hashing is encryption" | Hashing is ONE-WAY (you can't reverse it). Encryption is two-way (decryptable with the key). Different purposes. |
| 9 | "IP address identifies the user" | IP identifies a DEVICE on a network at a moment in time. NAT, DHCP and shared Wi-Fi mean it's not a reliable user identifier. |
| 10 | "TCP is better than UDP" | TCP is RELIABLE (good for files, web pages). UDP is FAST (good for video calls, gaming). Different tools for different jobs. |
| 11 | "A vulnerability is the same as a threat" | Vulnerability = weakness. Threat = something that could exploit it. Risk = likelihood ร impact. Three different things. |
| 12 | "MFA stops all account hacks" | MFA stops MOST password-based attacks. SIM-swapping, MFA fatigue, and session hijacking can still bypass it. |
| 13 | "The cloud is just someone else's computer" | True but trivialising. Cloud = managed infrastructure with shared responsibility. The provider secures the platform; YOU secure your data and access. |
| 14 | "WPA2 Wi-Fi is unhackable" | WPA2 is broken in known ways (KRACK, weak passwords). WPA3 is current best practice. No protocol is permanently unbreakable. |
| 15 | "You can't be hacked if you don't click anything" | Drive-by downloads, zero-click exploits, network attacks, and supply-chain attacks don't need user interaction. Click hygiene helps but isn't enough. |