Networking is the practice of connecting computers and other devices to share resources like files, printers, and internet access. It forms the backbone of modern communication.
A network is a group of two or more devices (like computers, phones, servers, etc.) connected together to share information, resources, and services.
| Device | Function | Cyber Security Role |
|---|---|---|
| Router | Connects multiple networks, routes traffic | Can include firewalls and VPN support to secure traffic between networks |
| Switch | Connects devices within a LAN | Offers features like VLANs for network segmentation, improving security |
| Hub | Basic version of a switch, broadcasts to all | Insecureโmakes networks vulnerable to packet sniffing (deprecated) |
| Firewall | Controls incoming and outgoing traffic | Prevents unauthorized access and blocks malicious traffic |
| Modem | Converts analog signals to digital and vice versa | Entry point to the internet; needs to be secured |
| WAP | Provides wireless access to a wired network | Must use strong encryption (e.g., WPA3) |
| VPN | Encrypts network connections over public or untrusted networks | Provides confidentiality, integrity, and anonymity for remote users |
| Topology | Description | Pros | Cons |
|---|---|---|---|
| Bus | Single cable backbone | Easy to install | Difficult troubleshooting |
| Star | Devices connect to a central hub | Easy to manage | Central hub failure risk |
| Mesh | Devices interconnected | High reliability | Expensive, complex |
| Hybrid | Mix of two or more topologies | Scalable | Complex design |
| Layer | Function | Cybersecurity Concerns |
|---|---|---|
| Physical | Hardware transmission | Cable tapping, physical damage |
| Data Link | MAC addressing, switching | MAC spoofing |
| Network | IP addressing, routing | IP spoofing, DDoS |
| Transport | TCP/UDP, segmentation | Port scanning, session hijacking |
| Session | Manages sessions | Session hijacking |
| Presentation | Data translation & encryption | Weak encryption, data leaks |
| Application | Interfaces for user apps | Application attacks, malware |
| Protocol | Port | Use Case | Security Concerns |
|---|---|---|---|
| HTTP | 80 | Web browsing | No encryption |
| HTTPS | 443 | Secure web | SSL/TLS needed |
| FTP | 21 | File transfers | Sends passwords in plain text |
| SSH | 22 | Secure remote access | Key/password brute force |
| DNS | 53 | Resolves domain names | DNS spoofing |
| Attack Type | Description | Example |
|---|---|---|
| DDoS | Flooding a server with traffic to crash it | Botnet attacks |
| MITM | Intercepting communication between two parties | ARP spoofing |
| Phishing | Social engineering to steal data | Fake login page |
Subnetting breaks a large network into smaller segments for security and efficiency. It helps with isolation, access control, and traffic management.