1.8 Introduction To Networks - Network Security

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

14/11/21 21:23 Introduction to Networks -Network Security


 Introduction to Networks v7.0
    

1 Networking Today
Check Your Understanding -   /  Networking Today /  Network Security
1.6.6
Reliable Networks

1.7 Network Trends 


Network Security
1.7.1 Recent Trends

1.8.1
1.7.2 Bring Your Own Device (BYOD)

Security Threats 
1.7.3 Online Collaboration

1.7.4 Video Communications You have, no doubt, heard or read news stories about a company network being breached, giving threat actors access to the
personal information of thousands of customers. For this reason, network security is always going to be a top priority of
1.7.5 Video - Cisco Webex for Huddles administrators.

Network security is an integral part of computer networking, regardless of whether the network is in a home with a single
1.7.6 Cloud Computing connection to the internet or is a corporation with thousands of users. Network security must consider the environment, as well
as the tools and requirements of the network. It must be able to secure data while still allowing for the quality of service that
1.7.7 Technology Trends in the Home users expect of the network.

Securing a network involves protocols, technologies, devices, tools, and techniques in order to protect data and mitigate threats.
1.7.8 Powerline Networking Threat vectors may be external or internal. Many external network security threats today originate from the internet.

1.7.9 Wireless Broadband There are several common external threats to networks:

Viruses, worms, and Trojan horses - These contain malicious software or code running on a user device.
Check Your Understanding -
1.7.10 Spyware and adware - These are types of software which are installed on a user’s device. The software then secretly
Network Trends
collects information about the user.
Zero-day attacks - Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
1.8 Network Security  Threat actor attacks - A malicious person attacks user devices or network resources.
Denial of service attacks - These attacks slow or crash applications and processes on a network device.
1.8.1 Security Threats Data interception and theft - This attack captures private information from an organization’s network.
Identity theft - This attack steals the login credentials of a user in order to access private data.

1.8.2 Security Solutions


It is equally important to consider internal threats. There have been many studies that show that the most common data
breaches happen because of internal users of the network. This can be attributed to lost or stolen devices, accidental misuse by
Check Your Understanding -
1.8.3 employees, and in the business environment, even malicious employees. With the evolving BYOD strategies, corporate data is
Network Security
much more vulnerable. Therefore, when developing a security policy, it is important to address both external and internal
security threats, as shown in the figure.
1.9 The IT Professional 

1.10 Module Practice and Quiz 

Internet
Basic Switch and End Device
2  Internal

Configuration
Threat
External

3 Threat
Protocols and Models 

4 Physical Layer 

5 Number Systems 

6 Data Link Layer  Compromised Host

7 Ethernet Switching 

8 Network Layer  1.8.2

Security Solutions 
9 Address Resolution 

No single solution can protect the network from the variety of threats that exist. For this reason, security should be implemented
10 Basic Router Configuration 
in multiple layers, using more than one security solution. If one security component fails to identify and protect the network,
others may succeed.

11 IPv4 Addressing  A home network security implementation is usually rather basic. Typically, you implement it on the end devices, as well as at the
point of connection to the internet, and can even rely on contracted services from the ISP.

12 IPv6 Addressing  These are the basic security components for a home or small office network:

Antivirus and antispyware - These applications help to protect end devices from becoming infected with malicious
13 software.
ICMP 
Firewall filtering - Firewall filtering blocks unauthorized access into and out of the network. This may include a host-based
firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent
unauthorized access from the outside world into the network.
14 Transport Layer 

In contrast, the network security implementation for a corporate network usually consists of many components built into the
network to monitor and filter traffic. Ideally, all components work together, which minimizes maintenance and improves security.
15 Application Layer  Larger networks and corporate networks use antivirus, antispyware, and firewall filtering, but they also have other security
requirements:

Network Security
16  Dedicated firewall systems - These provide more advanced firewall capabilities that can filter large amounts of traffic with
Fundamentals
more granularity.
Access control lists (ACL) - These further filter access and traffic forwarding based on IP addresses and applications.
Intrusion prevention systems (IPS) - These identify fast-spreading threats, such as zero-day or zero-hour attacks.
17 Build a Small Network  Virtual private networks (VPN) - These provide secure access into an organization for remote workers.

https://contenthub.netacad.com/itn/1.8.1 1/3
14/11/21 21:23 Introduction to Networks -Network Security
Network security requirements must consider the environment, as well as the various applications, and computing requirements.
Both home and business environments must be able to secure their data while still allowing for the quality of service that users
expect of each technology. Additionally, the security solution implemented must be adaptable to the growing and changing
trends of the network.

1 Networking Today  The study of network security threats and mitigation techniques starts with a clear understanding of the underlying switching and
Check Your Understanding -
1.6.6 routing infrastructure used to organize network services.
Reliable Networks

1.7 Network Trends 

1.7.1 Recent Trends

1.7.2 Bring Your Own Device (BYOD)

Access List LAN


1.7.3 Online Collaboration

1.7.4 Video Communications


Firewall
Internet
1.7.5 Video - Cisco Webex for Huddles

LAN
1.7.6 Cloud Computing

ACL Firewall
1.7.7 Technology Trends in the Home

1.7.8 Powerline Networking

1.7.9 Wireless Broadband

Check Your Understanding -


1.7.10
Network Trends

1.8 Network Security 

1.8.1 Security Threats

1.8.3
1.8.2 Security Solutions

Check Your Understanding -


Check Your Understanding - Network Security 

1.8.3
Network Security

1.9 The IT Professional 


 Check your understanding of network security by choosing the BEST answer to the following questions.

1.10 Module Practice and Quiz 


1. Which attack slows down or crashes equipment and programs?

Basic Switch and End Device


2  Firewall
Configuration
Virus, worm, or Trojan horse

Zero-day or Zero-hour
3 Protocols and Models 
Virtual Private Network (VPN)

Denial of Service (DoS)


4 Physical Layer 

2. Which option creates a secure connection for remote workers?

5 Number Systems  Firewall

Virus, worm, or Trojan horse

6 Data Link Layer  Zero-day or Zero-hour

Virtual Private Network (VPN)

7 Denial of Service (DoS)


Ethernet Switching 

3. Which option blocks unauthorized access to your network?


8 Network Layer 
Firewall

Virus, worm, or Trojan horse


9 Address Resolution  Zero-day or Zero-hour

Virtual Private Network (VPN)


10 Basic Router Configuration  Denial of Service (DoS)

4. Which option describes a network attack that occurs on the first day that a
11 IPv4 Addressing  vulnerability becomes known?

Firewall
12 IPv6 Addressing  Virus, worm, or Trojan horse

Zero-day or Zero-hour
13 ICMP  Virtual Private Network (VPN)

Denial of Service (DoS)

14 Transport Layer 
5. Which option describes malicious code running on user devices?

Firewall
15 Application Layer 
Virus, worm, or Trojan horse Check
Zero-day or Zero-hour
Network Security
16  Show Me
Fundamentals Virtual Private Network (VPN)

Denial of Service (DoS)


Reset
17 Build a Small Network 

https://contenthub.netacad.com/itn/1.8.1 2/3
14/11/21 21:23 Introduction to Networks -Network Security

 Network Trends 
1.7 1.9

The IT Professional

1 Networking Today
Check Your Understanding - 
1.6.6
Reliable Networks

1.7 Network Trends 

1.7.1 Recent Trends

1.7.2 Bring Your Own Device (BYOD)

1.7.3 Online Collaboration

1.7.4 Video Communications

1.7.5 Video - Cisco Webex for Huddles

1.7.6 Cloud Computing

1.7.7 Technology Trends in the Home

1.7.8 Powerline Networking

1.7.9 Wireless Broadband

Check Your Understanding -


1.7.10
Network Trends

1.8 Network Security 

1.8.1 Security Threats

1.8.2 Security Solutions

Check Your Understanding -


1.8.3
Network Security

1.9 The IT Professional 

1.10 Module Practice and Quiz 

Basic Switch and End Device


2 
Configuration

3 Protocols and Models 

4 Physical Layer 

5 Number Systems 

6 Data Link Layer 

7 Ethernet Switching 

8 Network Layer 

9 Address Resolution 

10 Basic Router Configuration 

11 IPv4 Addressing 

12 IPv6 Addressing 

13 ICMP 

14 Transport Layer 

15 Application Layer 

Network Security
16 
Fundamentals

17 Build a Small Network 

https://contenthub.netacad.com/itn/1.8.1 3/3

You might also like