0% found this document useful (0 votes)
18 views7 pages

Editing - Untitled - Note

The document discusses network security and protocols. It covers authentication, encryption, firewalls, and MAC address filtering as important methods for securing networks. It then discusses key network protocols like Ethernet, Wi-Fi, TCP, UDP, IP, HTTP, HTTPS, FTP, SMTP, and IMAP that define how devices communicate over networks and the internet. These protocols operate within the four layers of the TCP/IP model - the application, transport, internet, and link layers - to ensure reliable transmission of data packets between devices.

Uploaded by

Axjxla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views7 pages

Editing - Untitled - Note

The document discusses network security and protocols. It covers authentication, encryption, firewalls, and MAC address filtering as important methods for securing networks. It then discusses key network protocols like Ethernet, Wi-Fi, TCP, UDP, IP, HTTP, HTTPS, FTP, SMTP, and IMAP that define how devices communicate over networks and the internet. These protocols operate within the four layers of the TCP/IP model - the application, transport, internet, and link layers - to ensure reliable transmission of data packets between devices.

Uploaded by

Axjxla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Untitled

Network Security

Network Security

With more devices than ever connected to different networks, hacking and corporate espionage on the rise,
and increasingly sophisticated ways of people stealing data, it is really important to secure networks as much
as possible against attack. Most networks will have a network manager who is responsible for the day-to-
day running of the network, and part of their role is to manage the security and make sure only authorised
people can connect to the network.

Fortunately there are a number of different ways of doing this.

These include:

1. authentication
2. encryption
3. firewall
4. MAC address filtering

Each one is important for different reasons, and using them together provides a greater level of security than
using them in isolation.

Encryption

Encryption is turning data into an unreadable format, that can only be understood by using a key to decrypt
it. This means that if a laptop (for example) is stolen, the thief cannot simply remove the hard drive and take
all the data from it. They will need to also have access to the key to make the data readable.

Encryption can be easily used alongside authentication. For example, on Mac computers, data is encrypted
on the hard drive by the operating system. When a user types in their password to access their account, the
data is unencrypted, and they are able to read what is there. However, if another person comes along to try
and take it, they would have to get into the user’s account before they could access any of the data.

Encryption is increasingly used for communication too. For example, WhatsApp uses end-to-end encryption,
which means that Governments and other organisations (including WhatsApp) are unable to intercept any
messages that are sent between devices in an understandable way, and only the users at either end can
read them.

Authentication

Authentication refers to methods that are used to make sure a user is who they say they are. For example,
this could be through the use of password protected accounts, security dongles, or even biometric measures
such as fingerprints or facial recognition.

Authentication measures are the most basic security feature, and are used in a wide range of places.
Different levels of authentication can be used depending on the security level required. For example, in
many places two-factor authentication is now needed, where people have to both enter a password, and use
another registered device to log in to their account (as an example).
One thing that authentication allows is the use of access rights, which grant different users access to
different areas of the network. For example, an administrator (such as the network manager) might have
access to all areas of the network, including protected files and settings, whilst a guest account may only
have limited access to the internet and no more.

Firewall

A firewall is a piece of software that controls what information is allowed into and out of a network. It is a
barrier between a trusted and untrusted network.

For example, most networks are used (in part) to connect devices to the internet, but this poses a massive
security risk. By using a firewall, a network manager can decide what data packets can get into and out of the
trusted network, and will block any unauthorised packets travelling in either direction.

The security settings are set within the trusted network, so rely on good use of authentication to prevent any
unauthorised tampering with the settings.

MAC Address Filtering

All devices with a network adapter are given a permanent physical address known as a MAC Address. This
address is unique to each device and cannot be changed, allowing individual devices on a network to be
identified easily.

By using this address, a network manager can choose which devices they allow to connect to the network,
and which are blocked from access. This is known as MAC address filtering.

For example, in a university, many students will use the internet in halls of residence. However, this can pose
a security risk. So what they may do is allow each student to have a certain number of devices registered to
their account, and only these devices can then connect. This reduces how many devices are connected to the
network, as well as manage which devices are accessing particular content. If the network manager feels that
a students’ browsing habits is a potential threat to the University network, they can revoke their rights, and

stop their device from being able to connect.


Network Protocols

Network Protocols

With all the data packets flying around the internet, it’s hard to see how on earth anything gets to where it
needs to. In fact, as with all of life, network traffic is only managed successfully through the use of well-
defined, universal rules known as protocols.

A network protocol is an agreed way of communicating over a network.

Each protocol should specify the following:

1. How to start and end a connection between the devices


2. How to start and end messages
3. What to do if there is an error in the transmission
4. What the data being sent ‘looks’ like i.e. how is it split up

There are at least 35 different standard protocols in use on a day-to-day basis to help manage traffic on the
internet. However, you only need to be aware of 10.

1. Ethernet
2. Wi-Fi
3. TCP (Transmission Control Protocol)
4. __UDP __(User Datagram Protocol)
5. __IP __(Internet Protocol)
6. HTTP (Hypertext Transfer Protocol)
7. HTTPS (Hypertext Transfer Protocol Secure)
8. FTP (File Transfer Protocol)
9. email protocols:
10. SMTP (Simple Mail Transfer Protocol)
11. IMAP (Internet Message Access Protocol).

Connection Protocols - Ethernet and Wi-Fi

Ethernet is a family of related protocols which deal with how data is sent along ethernet cables - it isn’t a
single protocol. There are lots of parts to the ethernet protocol family, which include how the hardware is
managed, as well as how data is sent and received and how data collisions are managed.

Wi-Fi is also a family of related protocols and deals with how data is sent through wireless connections. In
fact, Wi-Fi is a trademark, and the generic term for networks of this nature is WLAN. Any device which has
the Wi-Fi logo on it uses the Wi-Fi protocol, and therefore is able to connect wirelessly to other Wi-Fi enabled

devices.

Transmission Protocols - TCP and UDP

Both TCP and UDP control how packets are prepared for sending across the internet and what happens to
them when they are received on the other side.

TCP is the most widely used of the two, and is also the most reliable. Using TCP, packets are addressed and
tracked through the network to make sure that they arrive safely at their destination. Any packets that don’t
arrive where they are supposed to be are resent by the sender.

UDP__ __however does away with the packet tracking meaning that everything is sent just once, and if
packets don’t arrive, they aren’t resent. The advantage of using UDP is that it is a lot quicker, and so it is often
used in online gaming or live streams where quality is less important than speed.

Addressing Protocol - IP

When a device is connected to the internet it is assigned an address called an IP Address. This address may
change between connections, but allows all devices to be identified on the internet for the purpose of data
packet addressing.

The IP (Internet Protocol) manages the addressing of the data packets, and is responsible for adding the
sender and receiver IP addresses to each packet, as well as determining which data packets are addressed
for that machine. It works alongside the TCP protocol to ensure that data is sent securely across the internet.

Transfer Protocols - HTTP, HTTPS and FTP

Both HTTP__ and __HTTPS are protocols which are responsible for sending requests for and receiving web

pages. HTTP is the protocol which is underlies the World Wide Web, and all websites with___ http:// ___in the

address are packaged using the HTTP protocol.

Like HTTP, HTTPS is also responsible for sending and receiving web pages, but provides an encrypted version
of HTTP for more secure web transactions. To make sure that you are safe online, you should try to use

HTTPS for any webpage that has sensitive data such as usernames or passwords.

FTP is the protocol used to upload or download (i.e. transfer) files between computers and the internet.

Email Protocols - SMTP and IMAP

There are lots of different protocols for sending emails, but you only need to know about SMTP and IMAP.

SMTP is used by mail servers to send and receive mail from all other mail servers around the world.

IMAP__ __controls the download/upload of emails to and from the mail server. It creates a copy of the email
on the device that you have, but also leaves a copy on the mail server so that it can be viewed on other

devices as well.
TCP / IP Model

As mentioned above, TCP and IP are two protocols that are used to control communication through the
internet. They both work together in the TCP/IP model to ensure that all messages sent from one computer

to another arrive safely.

There are four different layers within the TCP/IP model and each layer is responsible for different parts of

the communication process.

Splitting the model into layers allow the system to be easily modified as hardware improves:

1. application layer

2. transport layer
3. internet layer

4. link layer.

Packets are sent through each layer in turn, before being communicated through the link layer to the
receiving device where it goes back through each layer.
Application Layer

This is where the network applications, such as web browsers or email programs, operate. It is also where
the transfer (HTTP, HTTPS, FTP) and email (SMTP and IMAP) protocols operate.

Transport Layer

This layer sets up the communication between the two hosts and they agree settings such as ‘language’ and

size of packets. This is where the transmission (TCP and UDP) protocols operate.

Internet Layer

This layer addresses and packages data for transmission, and is responsible for routing the packets across

the network. This is where the addressing protocol (IP) operates.

Link Layer

This is where the network hardware such as the NIC (network interface card) is located. OS device drivers
also sit here.

You might also like