Editing - Untitled - Note
Editing - Untitled - Note
Network Security
Network Security
With more devices than ever connected to different networks, hacking and corporate espionage on the rise,
and increasingly sophisticated ways of people stealing data, it is really important to secure networks as much
as possible against attack. Most networks will have a network manager who is responsible for the day-to-
day running of the network, and part of their role is to manage the security and make sure only authorised
people can connect to the network.
These include:
1. authentication
2. encryption
3. firewall
4. MAC address filtering
Each one is important for different reasons, and using them together provides a greater level of security than
using them in isolation.
Encryption
Encryption is turning data into an unreadable format, that can only be understood by using a key to decrypt
it. This means that if a laptop (for example) is stolen, the thief cannot simply remove the hard drive and take
all the data from it. They will need to also have access to the key to make the data readable.
Encryption can be easily used alongside authentication. For example, on Mac computers, data is encrypted
on the hard drive by the operating system. When a user types in their password to access their account, the
data is unencrypted, and they are able to read what is there. However, if another person comes along to try
and take it, they would have to get into the user’s account before they could access any of the data.
Encryption is increasingly used for communication too. For example, WhatsApp uses end-to-end encryption,
which means that Governments and other organisations (including WhatsApp) are unable to intercept any
messages that are sent between devices in an understandable way, and only the users at either end can
read them.
Authentication
Authentication refers to methods that are used to make sure a user is who they say they are. For example,
this could be through the use of password protected accounts, security dongles, or even biometric measures
such as fingerprints or facial recognition.
Authentication measures are the most basic security feature, and are used in a wide range of places.
Different levels of authentication can be used depending on the security level required. For example, in
many places two-factor authentication is now needed, where people have to both enter a password, and use
another registered device to log in to their account (as an example).
One thing that authentication allows is the use of access rights, which grant different users access to
different areas of the network. For example, an administrator (such as the network manager) might have
access to all areas of the network, including protected files and settings, whilst a guest account may only
have limited access to the internet and no more.
Firewall
A firewall is a piece of software that controls what information is allowed into and out of a network. It is a
barrier between a trusted and untrusted network.
For example, most networks are used (in part) to connect devices to the internet, but this poses a massive
security risk. By using a firewall, a network manager can decide what data packets can get into and out of the
trusted network, and will block any unauthorised packets travelling in either direction.
The security settings are set within the trusted network, so rely on good use of authentication to prevent any
unauthorised tampering with the settings.
All devices with a network adapter are given a permanent physical address known as a MAC Address. This
address is unique to each device and cannot be changed, allowing individual devices on a network to be
identified easily.
By using this address, a network manager can choose which devices they allow to connect to the network,
and which are blocked from access. This is known as MAC address filtering.
For example, in a university, many students will use the internet in halls of residence. However, this can pose
a security risk. So what they may do is allow each student to have a certain number of devices registered to
their account, and only these devices can then connect. This reduces how many devices are connected to the
network, as well as manage which devices are accessing particular content. If the network manager feels that
a students’ browsing habits is a potential threat to the University network, they can revoke their rights, and
Network Protocols
With all the data packets flying around the internet, it’s hard to see how on earth anything gets to where it
needs to. In fact, as with all of life, network traffic is only managed successfully through the use of well-
defined, universal rules known as protocols.
There are at least 35 different standard protocols in use on a day-to-day basis to help manage traffic on the
internet. However, you only need to be aware of 10.
1. Ethernet
2. Wi-Fi
3. TCP (Transmission Control Protocol)
4. __UDP __(User Datagram Protocol)
5. __IP __(Internet Protocol)
6. HTTP (Hypertext Transfer Protocol)
7. HTTPS (Hypertext Transfer Protocol Secure)
8. FTP (File Transfer Protocol)
9. email protocols:
10. SMTP (Simple Mail Transfer Protocol)
11. IMAP (Internet Message Access Protocol).
Ethernet is a family of related protocols which deal with how data is sent along ethernet cables - it isn’t a
single protocol. There are lots of parts to the ethernet protocol family, which include how the hardware is
managed, as well as how data is sent and received and how data collisions are managed.
Wi-Fi is also a family of related protocols and deals with how data is sent through wireless connections. In
fact, Wi-Fi is a trademark, and the generic term for networks of this nature is WLAN. Any device which has
the Wi-Fi logo on it uses the Wi-Fi protocol, and therefore is able to connect wirelessly to other Wi-Fi enabled
devices.
Both TCP and UDP control how packets are prepared for sending across the internet and what happens to
them when they are received on the other side.
TCP is the most widely used of the two, and is also the most reliable. Using TCP, packets are addressed and
tracked through the network to make sure that they arrive safely at their destination. Any packets that don’t
arrive where they are supposed to be are resent by the sender.
UDP__ __however does away with the packet tracking meaning that everything is sent just once, and if
packets don’t arrive, they aren’t resent. The advantage of using UDP is that it is a lot quicker, and so it is often
used in online gaming or live streams where quality is less important than speed.
Addressing Protocol - IP
When a device is connected to the internet it is assigned an address called an IP Address. This address may
change between connections, but allows all devices to be identified on the internet for the purpose of data
packet addressing.
The IP (Internet Protocol) manages the addressing of the data packets, and is responsible for adding the
sender and receiver IP addresses to each packet, as well as determining which data packets are addressed
for that machine. It works alongside the TCP protocol to ensure that data is sent securely across the internet.
Both HTTP__ and __HTTPS are protocols which are responsible for sending requests for and receiving web
pages. HTTP is the protocol which is underlies the World Wide Web, and all websites with___ http:// ___in the
Like HTTP, HTTPS is also responsible for sending and receiving web pages, but provides an encrypted version
of HTTP for more secure web transactions. To make sure that you are safe online, you should try to use
HTTPS for any webpage that has sensitive data such as usernames or passwords.
FTP is the protocol used to upload or download (i.e. transfer) files between computers and the internet.
There are lots of different protocols for sending emails, but you only need to know about SMTP and IMAP.
SMTP is used by mail servers to send and receive mail from all other mail servers around the world.
IMAP__ __controls the download/upload of emails to and from the mail server. It creates a copy of the email
on the device that you have, but also leaves a copy on the mail server so that it can be viewed on other
devices as well.
TCP / IP Model
As mentioned above, TCP and IP are two protocols that are used to control communication through the
internet. They both work together in the TCP/IP model to ensure that all messages sent from one computer
There are four different layers within the TCP/IP model and each layer is responsible for different parts of
Splitting the model into layers allow the system to be easily modified as hardware improves:
1. application layer
2. transport layer
3. internet layer
4. link layer.
Packets are sent through each layer in turn, before being communicated through the link layer to the
receiving device where it goes back through each layer.
Application Layer
This is where the network applications, such as web browsers or email programs, operate. It is also where
the transfer (HTTP, HTTPS, FTP) and email (SMTP and IMAP) protocols operate.
Transport Layer
This layer sets up the communication between the two hosts and they agree settings such as ‘language’ and
size of packets. This is where the transmission (TCP and UDP) protocols operate.
Internet Layer
This layer addresses and packages data for transmission, and is responsible for routing the packets across
Link Layer
This is where the network hardware such as the NIC (network interface card) is located. OS device drivers
also sit here.