0% found this document useful (0 votes)
25 views5 pages

Introduction To Networks - Network Security

The document discusses network security threats and solutions. It describes common external threats like viruses, spyware, and denial of service attacks. It also covers internal threats from lost or stolen devices. A variety of solutions are needed, including antivirus software, firewalls, and additional security components for corporate networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views5 pages

Introduction To Networks - Network Security

The document discusses network security threats and solutions. It describes common external threats like viruses, spyware, and denial of service attacks. It also covers internal threats from lost or stolen devices. A variety of solutions are needed, including antivirus software, firewalls, and additional security components for corporate networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

9/3/23, 12:48 Introduction to Networks -Network Security

  Introduction to Networks v7.02

Show Menu
Check Your Understanding -  /  Networking Today /  Network Security
1.7.10
Network Trends
1 Networking Today 
1.8 Network Security  Network Security
1.8.1 Security Threats
1.8.1

1.8.2 Security Solutions


Security Threats 

Check Your Understanding -


1.8.3
Network Security
You have, no doubt, heard or read news stories about a company
network being breached, giving threat actors access to the
1.9 The IT Professional 
personal information of thousands of customers. For this reason,
network security is always going to be a top priority of
1.10 Module Practice and Quiz  administrators.

Network security is an integral part of computer networking,


Basic Switch and End Device regardless of whether the network is in a home with a single
2 
Configuration connection to the internet or is a corporation with thousands of
users. Network security must consider the environment, as well
as the tools and requirements of the network. It must be able to
3 Protocols and Models  secure data while still allowing for the quality of service that
users expect of the network.

4 Physical Layer  Securing a network involves protocols, technologies, devices,


tools, and techniques in order to protect data and mitigate
threats. Threat vectors may be external or internal. Many external
network security threats today originate from the internet.
5 Number Systems 

There are several common external threats to networks:

6 Data Link Layer  Viruses, worms, and Trojan horses - These contain malicious
software or code running on a user device.
Spyware and adware - These are types of software which
7 Ethernet Switching  are installed on a user’s device. The software then secretly
collects information about the user.
Zero-day attacks - Also called zero-hour attacks, these
8 occur on the first day that a vulnerability becomes known.
Network Layer 
Threat actor attacks - A malicious person attacks user
devices or network resources.
Denial of service attacks - These attacks slow or crash
9 Address Resolution  applications and processes on a network device.
Data interception and theft - This attack captures private
information from an organization’s network.
10 Basic Router Configuration  Identity theft - This attack steals the login credentials of a
user in order to access private data.

11 IPv4 Addressing  It is equally important to consider internal threats. There have


been many studies that show that the most common data
breaches happen because of internal users of the network. This
12 IPv6 Addressing
https://contenthub.netacad.com/itn-dl/1.8.1 1/5
9/3/23, 12:48 Introduction to Networks -Network Security
12 IPv6 Addressing  can be attributed to lost or stolen devices, accidental misuse by
employees, and in the business environment, even malicious
employees. With the evolving BYOD strategies, corporate data is
13 ICMP  much more vulnerable. Therefore, when developing a security
Show Menu policy, it is important to address both external and internal
Check Your Understanding -
1.7.10 security threats, as shown in the figure.
Network Trends
1 Networking Today 
1.8 Network Security 

Internet
1.8.1 Security Threats

1.8.2 Security Solutions


External
Threat
Check Your Understanding -
1.8.3
Network Security

1.9 The IT Professional 

1.10 Module Practice and Quiz 


1.8.2

Basic Switch and End Device Security Solutions 


2  Compro
Configuration

No single solution can protect the network from the variety of


3 Protocols and Models  threats that exist. For this reason, security should be
implemented in multiple layers, using more than one security
solution. If one security component fails to identify and protect
4 Physical Layer  the network, others may succeed.

A home network security implementation is usually rather basic.


Typically, you implement it on the end devices, as well as at the
5 Number Systems 
point of connection to the internet, and can even rely on
contracted services from the ISP.

6 Data Link Layer  These are the basic security components for a home or small
office network:

7 Ethernet Switching  Antivirus and antispyware - These applications help to


protect end devices from becoming infected with malicious
software.
Firewall filtering - Firewall filtering blocks unauthorized
8 Network Layer 
access into and out of the network. This may include a host-
based firewall system that prevents unauthorized access to
the end device, or a basic filtering service on the home router
9 Address Resolution  to prevent unauthorized access from the outside world into
the network.

10 Basic Router Configuration  In contrast, the network security implementation for a corporate
network usually consists of many components built into the
network to monitor and filter traffic. Ideally, all components work
11 IPv4 Addressing  together, which minimizes maintenance and improves security.
Larger networks and corporate networks use antivirus,

12 IPv6 Addressing
https://contenthub.netacad.com/itn-dl/1.8.1 2/5
9/3/23, 12:48 Introduction to Networks -Network Security
12 IPv6 Addressing  antispyware, and firewall filtering, but they also have other
security requirements:

13 ICMP  Dedicated firewall systems - These provide more advanced


Show Menu firewall capabilities that can filter large amounts of traffic with
Check Your Understanding -
1.7.10 more granularity.
Network Trends
1 Access control lists (ACL) - These further filter access and
Networking Today 
traffic forwarding based on IP addresses and applications.
1.8 Network Security  Intrusion prevention systems (IPS) - These identify fast-
spreading threats, such as zero-day or zero-hour attacks.
1.8.1 Security Threats Virtual private networks (VPN) - These provide secure
access into an organization for remote workers.

1.8.2 Security Solutions


Network security requirements must consider the environment,
as well as the various applications, and computing requirements.
Check Your Understanding - Both home and business environments must be able to secure
1.8.3
Network Security their data while still allowing for the quality of service that users
expect of each technology. Additionally, the security solution
1.9 The IT Professional  implemented must be adaptable to the growing and changing
trends of the network.

1.10 Module Practice and Quiz 


The study of network security threats and mitigation techniques
starts with a clear understanding of the underlying switching and
routing infrastructure used to organize network services.
Basic Switch and End Device
2 
Configuration

3 Protocols and Models 

4 Physical Layer 
Access List LAN

5 Number Systems 
Firewall
Internet
6 Data Link Layer 

LAN

7 Ethernet Switching 
ACL Firewall
1.8.3

8 Network Layer 
Check Your Understanding - 

Network Security
9 Address Resolution 

10 Basic Router Configuration  Check your understanding of network security by

 choosing the BEST answer to the following


questions.
11 IPv4 Addressing 

12 IPv6 Addressing
https://contenthub.netacad.com/itn-dl/1.8.1 3/5
9/3/23, 12:48 Introduction to Networks -Network Security
12 IPv6 Addressing  1. Which attack slows down or crashes equipment and
programs?

13 ICMP  Firewall
Show Menu
Check Your Understanding - Virus, worm, or Trojan horse
1.7.10
Network Trends
1 Zero-day or Zero-hour
Networking Today 
Virtual Private Network (VPN)
1.8 Network Security 
Denial of Service (DoS)
1.8.1 Security Threats
2. Which option creates a secure connection for remote
1.8.2 Security Solutions workers?

Firewall
Check Your Understanding -
1.8.3
Network Security Virus, worm, or Trojan horse

Zero-day or Zero-hour
1.9 The IT Professional 
Virtual Private Network (VPN)

Denial of Service (DoS)


1.10 Module Practice and Quiz 

3. Which option blocks unauthorized access to your network?


Basic Switch and End Device
2 
Configuration Firewall

Virus, worm, or Trojan horse


3 Protocols and Models  Zero-day or Zero-hour

Virtual Private Network (VPN)

4 Physical Layer  Denial of Service (DoS)

4. Which option describes a network attack that occurs on


5 Number Systems  the first day that a vulnerability becomes known?

Firewall
6 Data Link Layer  Virus, worm, or Trojan horse

Zero-day or Zero-hour

7 Ethernet Switching  Virtual Private Network (VPN)

Denial of Service (DoS)

8 Network Layer  5. Which option describes malicious code running on user


devices?

9 Address Resolution  Firewall

Virus, worm, or Trojan horse

10 Basic Router Configuration  Zero-day or Zero-hour

Virtual Private Network (VPN)

Denial of Service (DoS)


11 IPv4 Addressing 

12 IPv6 Addressing
https://contenthub.netacad.com/itn-dl/1.8.1 4/5
9/3/23, 12:48 Introduction to Networks -Network Security
12 IPv6 Addressing 
Check

13 ICMP  Show Me
Show Menu
Check Your Understanding -
1.7.10
Network Trends
1 Reset
Networking Today 
1.8 Network Security 

 
1.8.1 Security Threats 1.7 1.9
Network Trends The IT Professional

1.8.2 Security Solutions

Check Your Understanding -


1.8.3
Network Security

1.9 The IT Professional 

1.10 Module Practice and Quiz 

Basic Switch and End Device


2 
Configuration

3 Protocols and Models 

4 Physical Layer 

5 Number Systems 

6 Data Link Layer 

7 Ethernet Switching 

8 Network Layer 

9 Address Resolution 

10 Basic Router Configuration 

11 IPv4 Addressing 

12 IPv6 Addressing
https://contenthub.netacad.com/itn-dl/1.8.1 5/5

You might also like