Intro To Network Security
Intro To Network Security
Slide 2: Objectives
Types of Networks
Network Components
Network Topologies
Network Protocols
Computer Networks are interconnected systems of computers and other devices that enable the
sharing of information, resources, and services. They facilitate communication and data exchange
between multiple users and devices, both locally and globally, allowing for efficient data transfer,
collaboration, and access to remote resources.
The importance of networks in modern computing lies in their pivotal role as the backbone of
information exchange and collaboration. They enable seamless communication, data sharing, and access
to remote resources, making it possible for organizations and individuals to efficiently connect,
collaborate, and access information in a fast-paced digital world. Networks underpin the functionality of
the internet, cloud computing, and various applications, significantly impacting productivity, innovation,
and global connectivity.
A Local Area Network (LAN) is a network that connects computers and devices within a limited
geographical area, such as a home, office, or campus. LANs enable fast data transfer and resource
sharing among connected devices.
A Wide Area Network (WAN) is a network that covers a broader geographic area, often
connecting LANs from different locations. WANs use various technologies, including leased lines, satellite
links, and the internet, to connect distant sites and facilitate long-distance data communication.
Wireless Networks
Wireless Networks use radio waves to connect devices without physical cables. They are
common in homes and businesses, allowing for mobility and easy access to the internet. Examples
include Wi-Fi and cellular networks.
The Internet is a global network that connects millions of public and private networks
worldwide. It provides access to a vast array of information and services. In contrast, an Intranet is a
private network within an organization, allowing its members to share resources and collaborate while
maintaining internal security and control.
Computers/Devices
Computers and devices are the end-points in a network, such as desktop computers, laptops,
smartphones, printers, and servers. They generate, receive, and process data for communication and
resource sharing.
Routers
Routers are network devices that determine the best path for data packets to travel between
different networks. They connect multiple networks and make decisions about the most efficient routes
for data transmission.
Switches
Switches are network devices that operate at the data link layer (Layer 2) of the OSI model. They
forward data within a local network based on MAC addresses. They are commonly used to connect
devices within a LAN and improve network efficiency.
Hubs
Hubs are basic network devices that operate at the physical layer (Layer 1) of the OSI model.
They simply broadcast data received on one port to all other ports. Hubs are less common today, as they
are less efficient than switches.
Modem
Modems, short for 'modulator-demodulator,' convert digital data from a computer into analog
signals for transmission over analog communication lines and vice versa. They enable the connection
between digital devices and analog telephone or cable lines.
Cables and connectors are physical mediums used to transmit data between network devices.
Common types include Ethernet cables (e.g., Cat5e, Cat6), coaxial cables, fiber-optic cables, and
connectors such as RJ45 for Ethernet connections.
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Hybrid Topology
Network protocols are a set of rules and conventions that govern how data is formatted,
transmitted, received, and processed in a computer network. They play a crucial role in enabling
communication and data exchange between devices and systems within a network.
HTTP/HTTPS
FTP
DNS
SMTP
Network security refers to the practice of protecting computer networks, infrastructure, and
data from unauthorized access, breaches, or damage. It involves implementing various measures and
safeguards to ensure the confidentiality, integrity, and availability of data and resources within a
network. Network security is essential to safeguard sensitive information and maintain the overall
functionality and trustworthiness of a network.
The importance of network security cannot be overstated in the digital age. It plays a critical role for
several reasons:
Network security safeguards sensitive data, including personal information, financial records, and
intellectual property, from unauthorized access and theft.
2. Preservation of Reputation:
A security breach can damage an organization's reputation, erode customer trust, and result in financial
losses. Robust network security helps maintain a positive image.
3. Business Continuity:
Network security ensures the availability of critical systems and resources, minimizing downtime due to
cyberattacks, hardware failures, or disasters.
4. Compliance:
Many industries and organizations must comply with legal and regulatory requirements related to data
security. Network security helps meet these obligations.
Network security measures can prevent data loss due to accidents or malicious actions, protecting
essential information.
7. Global Connectivity:
In an interconnected world, network security enables safe global connectivity while minimizing the risks
associated with remote access and communication.
1. Confidentiality:
Confidentiality ensures that sensitive data is accessible only to authorized individuals or systems. It
involves encryption and access controls to protect information from unauthorized access or disclosure.
For example, in healthcare, patient records should only be accessible to healthcare professionals with
the appropriate permissions.
2. Integrity:
Integrity ensures that data remains accurate and unaltered during transmission and storage. It involves
measures to prevent unauthorized modification or tampering with data. Hash functions and digital
signatures are used to verify data integrity. For instance, financial transaction records should not be
altered by unauthorized parties.
3. Availability:
Availability ensures that network resources and services are consistently accessible to authorized users.
This involves measures to prevent disruptions caused by hardware failures, cyberattacks, or natural
disasters. Redundancy, load balancing, and disaster recovery planning are used to maintain availability.
For example, e-commerce websites need to be available for customers 24/7.
Phishing Attacks
Insider Threats
Data Breaches
Social Engineering
Password Attacks
Encryption