Unit 2 Cyber
Unit 2 Cyber
1. Firewalls
What they do: Firewalls act like a barrier between your network and
the outside world (like the internet). They check and block harmful
traffic from entering the network.
Why they matter: They keep unwanted visitors out and protect your
network from attacks.
2. Intrusion Detection and Prevention Systems (IDS/IPS)
What they do: These systems watch network traffic to find any
suspicious activity (like hackers trying to break in). If they detect a
threat, they either alert you (IDS) or stop it (IPS).
Why they matter: They help catch bad things happening on the
network before they cause harm.
3. Virtual Private Network (VPN)
What it does: A VPN creates a secure, private connection between
your computer and the internet. It keeps your data safe from being
seen or stolen when using public Wi-Fi.
Why it matters: It helps keep your information safe while using the
internet, especially when you're working remotely.
4. Encryption Tools
What they do: Encryption changes data into a code so that only the
right person can understand it. It keeps sensitive information safe
when it’s sent over the network.
Why it matters: If your data is encrypted, even if someone steals it,
they won’t be able to read it.
5. Anti-Malware Software
What it does: Anti-malware software (like antivirus) detects and
removes viruses, spyware, and other malicious software.
Why it matters: It keeps your devices safe from harmful programs
that can steal information or cause problems.
6. Network Segmentation
What it does: This divides your network into smaller parts, so if one
part gets attacked, the others are still safe.
Why it matters: It helps contain damage and keeps the rest of your
network secure.
7. Access Control
What it does: Access control ensures that only the right people or
devices can use certain parts of the network. It checks users’
identities before allowing them to access sensitive data or systems.
Why it matters: It stops unauthorized people from accessing or
damaging important resources.
8. Security Monitoring
What it does: Monitoring tools watch your network constantly to look
for signs of problems or attacks.
Why it matters: It helps you quickly find and fix any issues before
they cause big problems.
How Network Security Infrastructure Works Together
These parts of network security work together to keep your network safe:
Firewalls stop harmful traffic.
IDS/IPS find and stop attacks.
VPNs secure remote connections.
Encryption keeps data safe while being sent.
Anti-malware protects from harmful software.
Access Control ensures only authorized users can access sensitive
data.
Monitoring watches for issues and alerts you to problems.
Why It’s Important
A good network security infrastructure helps protect against hackers,
viruses, and other cyber threats. It makes sure data is safe, networks stay
up and running, and unauthorized users can't access private information.
Without this infrastructure, networks are more vulnerable to attacks and
damage.
Network Topologies
Definition: The physical or logical arrangement of network devices and
how they communicate.
Detailed Types:
o Bus Topology:
Security Services
1. Authentication
Authentication is the process of verifying the identity of users, devices, or
systems trying to access a network. It ensures that only authorized entities are
granted access to network resources.
Types of Authentication:
Password-Based Authentication: Users provide a username and
password to verify their identity.
Two-Factor Authentication (2FA): Combines two forms of
authentication, usually something you know (password) and something
you have (e.g., a smartphone or hardware token).
Biometric Authentication: Uses physical characteristics like fingerprints
or facial recognition to authenticate users.
Certificate-Based Authentication: Utilizes digital certificates to validate
the identity of users, devices, or services.
Protocols:
Kerberos: A network authentication protocol that uses tickets to
authenticate users and services in a secure manner.
RADIUS (Remote Authentication Dial-In User Service): A protocol for
centralized authentication, authorization, and accounting, often used in
wireless networks.
TACACS+: A security protocol that provides AAA (Authentication,
Authorization, and Accounting) for network devices.
2. Authorization
Authorization refers to the process of granting or denying access to specific
resources based on the identity of an authenticated user or device. Once a user
is authenticated, the system needs to decide what resources or actions they are
allowed to access.
Types of Authorization Models:
Discretionary Access Control (DAC): The owner of a resource decides
who has access to it.
Mandatory Access Control (MAC): Access to resources is determined
based on system-enforced policies (e.g., classification of data).
Role-Based Access Control (RBAC): Users are assigned roles, and
access is based on the role’s permissions.
Attribute-Based Access Control (ABAC): Access is granted based on
attributes (e.g., department, location, time).
Protocols:
LDAP (Lightweight Directory Access Protocol): A protocol used to
query and modify directory services that store authentication and
authorization data.
OAuth: An authorization framework commonly used in third-party
authentication systems.
3. Confidentiality
Confidentiality ensures that data is kept secret from unauthorized users or
entities. It is one of the key principles of information security, ensuring that
sensitive information (e.g., passwords, financial data) is not exposed.
Encryption:
Symmetric Encryption: The same key is used to both encrypt and
decrypt the data. Common algorithms include AES (Advanced
Encryption Standard) and DES (Data Encryption Standard).
Asymmetric Encryption: Uses a pair of keys (public and private).
Common algorithms include RSA and ECC (Elliptic Curve
Cryptography).
End-to-End Encryption (E2EE): Data is encrypted on the sender's
device and can only be decrypted by the recipient, ensuring that no
intermediate party can read the data.
Protocols:
SSL/TLS (Secure Sockets Layer / Transport Layer Security):
Protocols that provide encryption and secure communication over
networks, especially for web traffic (HTTPS).
IPsec (Internet Protocol Security): A suite of protocols for securing IP
communications by authenticating and encrypting each IP packet in a
communication session.
4. Integrity
Integrity ensures that data is not altered in transit or storage, whether
accidentally or maliciously. Data integrity guarantees that information remains
accurate, consistent, and unmodified.
Hashing:
Hash Functions: A cryptographic hash function (e.g., SHA-256) is used
to produce a fixed-size string from variable-length data. Even a small
change in the original data will result in a completely different hash.
Digital Signatures: A combination of hashing and asymmetric encryption
that ensures data integrity and authenticity. The sender creates a digital
signature over the data, and the recipient can verify both the integrity of
the data and the identity of the sender.
Protocols:
HMAC (Hash-Based Message Authentication Code): A specific type of
cryptographic hash function used for verifying both the integrity and
authenticity of a message.
Message Authentication Code (MAC): A code that ensures the
integrity and authenticity of a message using a secret key.
5. Availability
Availability refers to ensuring that network resources and services are
accessible and operational when needed by authorized users. This involves
implementing measures to prevent downtime due to cyberattacks, system
failures, or other disruptions.
Redundancy and Fault Tolerance:
Load Balancing: Distributes network traffic across multiple servers to
ensure that no single server is overwhelmed.
Clustering: Combines multiple servers or systems into a group to ensure
high availability in case one server fails.
Failover: Automatically switches to a backup system in case the primary
system becomes unavailable.
Protection Against Denial of Service (DoS):
Anti-DDoS Protection: Uses firewalls, load balancers, and specialized
anti-DDoS devices to mitigate traffic overloads that could lead to service
disruption.
Traffic Filtering: Filters out malicious traffic before it reaches the network
or server.
Network Attacks
Denial of Service (DoS) Attacks
Definition: Aimed at making a service unavailable to its intended
users by overwhelming it with requests.
Types:
o Flood Attacks: Send a large volume of traffic to overwhelm
bandwidth.
SYN Flood: Exploits the TCP handshake by sending SYN
requests but never completing the handshake.
UDP Flood: Sends a barrage of UDP packets to random
ports, causing the system to respond with ICMP packets.
o Application Layer Attacks: Target specific applications to
exhaust resources.
HTTP Flood: Overwhelms web servers with requests for
web pages.
Mitigation: Use rate limiting, traffic filtering, and DDoS protection
services to absorb or redirect malicious traffic.
. Distributed Denial of Service (DDoS) Attacks
Definition: Similar to DoS but launched from multiple compromised
devices (botnets) to amplify the attack.
Characteristics:
o Scale: Can involve thousands of infected devices.
o Amplification: Attackers use DNS amplification or NTP
reflection to significantly increase attack volume.
Mitigation: Deploy DDoS protection services, implement redundant
server architecture, and use anycast routing to distribute traffic.
. Man-in-the-Middle (MitM) Attacks
Definition: An attacker intercepts and potentially alters the
communication between two parties without their knowledge.
Methods:
o Eavesdropping: Capturing data transmitted over insecure
networks.
o Session Hijacking: Taking over a web session after the user
has logged in, often using stolen session cookies.
o SSL Stripping: Downgrading HTTPS connections to HTTP to
intercept unencrypted data.
Mitigation: Use strong encryption protocols (TLS), implement secure
coding practices, and employ VPNs for sensitive communications.
Phishing Attacks
Definition: Deceptive attempts to acquire sensitive information by
impersonating legitimate entities, often via email.
Types:
o Spear Phishing: Targeted attacks on specific individuals or
organizations, often using personalized information.
o Whaling: High-profile phishing attacks aimed at executives or
high-ranking officials.
o Clone Phishing: An attacker creates a nearly identical replica
of a legitimate email previously sent, changing the
attachment or link to a malicious one.
Mitigation: User training, email filtering, and employing multi-factor
authentication (MFA).
. Malware Attacks
Types of Malware:
o Viruses: Malicious code that attaches to legitimate files and
spreads when the file is executed.
o Worms: Self-replicating malware that spreads through networks
without human intervention.
o Trojans: Malicious software disguised as legitimate software
that, when executed, compromises the system.
o Ransomware: Encrypts files on a victim's system and demands
payment for decryption.
Mitigation: Use updated antivirus software, regular system scans, and
user education on safe browsing habits.
o Customizable dashboards.
3. Nagios
Function: Open-source network monitoring system that helps track the
status of network devices, servers, and services. Nagios alerts
administrators if there are issues.
Features:
o Open-source, highly customizable.
4. Wireshark
Function: A packet analyzer used to capture and analyze network traffic
in detail. It's widely used for troubleshooting and identifying issues in data
packets.
Features:
o Real-time packet capture and analysis.
5. Zabbix
Function: An open-source network monitoring tool that provides metrics,
such as CPU load, memory usage, and network utilization, across multiple
devices.
Features:
o Highly customizable monitoring.
6. NetFlow Analyzer
Function: A tool specifically designed to monitor bandwidth usage and
flow data. It uses NetFlow or similar technologies to analyze network
traffic and identify bottlenecks.
Features:
o Flow-based traffic analysis.
7. ManageEngine OpManager
Function: A comprehensive network monitoring tool used to track
network performance, availability, and health of devices. It’s suitable for
large-scale enterprise networks.
Features:
o Real-time monitoring and alerts.
o Customizable dashboards.