Introduction To Networks - Network Security
Introduction To Networks - Network Security
Show Menu
Check Your Understanding - / Networking Today / Network Security
1.7.10
Network Trends
1 Networking Today
1.8 Network Security Network Security
1.8.1 Security Threats
1.8.1
6 Data Link Layer Viruses, worms, and Trojan horses - These contain malicious
software or code running on a user device.
Spyware and adware - These are types of software which
7 Ethernet Switching are installed on a user’s device. The software then secretly
collects information about the user.
Zero-day attacks - Also called zero-hour attacks, these
8 occur on the first day that a vulnerability becomes known.
Network Layer
Threat actor attacks - A malicious person attacks user
devices or network resources.
Denial of service attacks - These attacks slow or crash
9 Address Resolution applications and processes on a network device.
Data interception and theft - This attack captures private
information from an organization’s network.
10 Basic Router Configuration Identity theft - This attack steals the login credentials of a
user in order to access private data.
Internet
1.8.1 Security Threats
6 Data Link Layer These are the basic security components for a home or small
office network:
10 Basic Router Configuration In contrast, the network security implementation for a corporate
network usually consists of many components built into the
network to monitor and filter traffic. Ideally, all components work
11 IPv4 Addressing together, which minimizes maintenance and improves security.
Larger networks and corporate networks use antivirus,
12 IPv6 Addressing
https://contenthub.netacad.com/itn-dl/1.8.1 2/5
9/3/23, 12:48 Introduction to Networks -Network Security
12 IPv6 Addressing antispyware, and firewall filtering, but they also have other
security requirements:
4 Physical Layer
Access List LAN
5 Number Systems
Firewall
Internet
6 Data Link Layer
LAN
7 Ethernet Switching
ACL Firewall
1.8.3
8 Network Layer
Check Your Understanding -
Network Security
9 Address Resolution
12 IPv6 Addressing
https://contenthub.netacad.com/itn-dl/1.8.1 3/5
9/3/23, 12:48 Introduction to Networks -Network Security
12 IPv6 Addressing 1. Which attack slows down or crashes equipment and
programs?
13 ICMP Firewall
Show Menu
Check Your Understanding - Virus, worm, or Trojan horse
1.7.10
Network Trends
1 Zero-day or Zero-hour
Networking Today
Virtual Private Network (VPN)
1.8 Network Security
Denial of Service (DoS)
1.8.1 Security Threats
2. Which option creates a secure connection for remote
1.8.2 Security Solutions workers?
Firewall
Check Your Understanding -
1.8.3
Network Security Virus, worm, or Trojan horse
Zero-day or Zero-hour
1.9 The IT Professional
Virtual Private Network (VPN)
Firewall
6 Data Link Layer Virus, worm, or Trojan horse
Zero-day or Zero-hour
12 IPv6 Addressing
https://contenthub.netacad.com/itn-dl/1.8.1 4/5
9/3/23, 12:48 Introduction to Networks -Network Security
12 IPv6 Addressing
Check
13 ICMP Show Me
Show Menu
Check Your Understanding -
1.7.10
Network Trends
1 Reset
Networking Today
1.8 Network Security
1.8.1 Security Threats 1.7 1.9
Network Trends The IT Professional
4 Physical Layer
5 Number Systems
7 Ethernet Switching
8 Network Layer
9 Address Resolution
11 IPv4 Addressing
12 IPv6 Addressing
https://contenthub.netacad.com/itn-dl/1.8.1 5/5