Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
11 views21 pages

SCT Unit - 1

The document provides an overview of network fundamentals including network components, types, and communication types. It discusses topics like local area networks, wide area networks, wireless networks, and introduces common networking models like OSI and TCP/IP.

Uploaded by

Evil Psython
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views21 pages

SCT Unit - 1

The document provides an overview of network fundamentals including network components, types, and communication types. It discusses topics like local area networks, wide area networks, wireless networks, and introduces common networking models like OSI and TCP/IP.

Uploaded by

Evil Psython
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

UNIT I:

Network and Information security Fundamentals: Network Basics, Network Components, Network
Types, Network Communication Types. Introduction to Networking Models, Cyber Security
Objectives and Services, Other Terms of Cyber Security, Myths Around Cyber Security, Myths
Around Cyber Security, Recent Cyber Attacks, Generic Conclusion about Attacks, Why and What is
Cyber Security, Categories of Attack

Network Basics

A network is a group of interconnected devices that can communicate with each other. These
devices can be computers, servers, printers, or other devices. Networks can be small, such as
a home network, or large, such as the Internet. Networks can be wired or wireless.

Wired networks use cables to connect devices. Wireless networks use radio waves to connect
devices.

Network Components with Diagram


A computer network is made up of various components, each playing a crucial role in facilitating
communication and data exchange. Here are some of the essential network components:
1. Network Interface Card (NIC):
 This card installed in each network device acts as the communication interface between the
device and the network. It converts data from the device's internal format to a format suitable
for transmission over the network and vice versa.

2. Cables:
 Cables provide the physical medium for data transmission between devices. Different types of
cables exist, including twisted-pair, coaxial, and fiber optic, each with its own advantages and
limitations.

3. Hubs:
 Hubs are central devices that connect multiple network devices together. They receive data
packets from one device and retransmit them to all other connected devices.

4. Switches:
 Switches are more intelligent than hubs and can learn the MAC addresses of connected
devices. This allows them to direct data packets only to the intended recipient, improving
network efficiency and reducing congestion.
5. Routers:
 Routers connect multiple networks and serve as the traffic directors. They analyze data
packets and determine the optimal path for forwarding them to their destination networks.

6. Modem:
 A modem modulates and demodulates signals, enabling communication between devices over
different media like telephone lines or cable lines.

7. Access Points:
 Access points provide wireless connectivity to devices within a specific area. They act as
bridges between wired and wireless networks, allowing wireless devices to connect to the
network and access its resources.
8. Repeater:
 Repeaters amplify weakened signals, extending the reach of a network and ensuring reliable
transmission across longer distances.

9. Servers:
 Servers are powerful computers that provide resources and services to other network devices,
such as file storage, printing, and email.

10. Clients:
 Clients are devices that connect to the network to access resources and services provided by
servers. These can be desktops, laptops, smartphones, tablets, or any device capable of
network communication.
These are just some of the essential network components. The specific components and their
configuration will vary depending on the size and complexity of the network.
Network Types
Computer networks can be categorized based on their size, scope, and technology used. Here are
some of the most common network types:
1. Local Area Network (LAN):
 A LAN connects devices in a geographically limited area, such as a home, office, or school.
 Typically covers an area up to 10 km.
 Uses technologies like Ethernet cables or Wi-Fi for connection.
 Offers high speed and data transfer rates.
 Suitable for sharing resources like printers, files, and applications.
2. Wide Area Network (WAN):
 A WAN connects devices across a large geographical area, such as a city, state, or even the
entire world.
 Can span thousands of kilometers.
 Uses technologies like leased lines, satellite links, and public networks like the Internet for
connection.
 Offers lower speed than LANs but enables long-distance communication.
 Suitable for connecting geographically distributed offices, branches, and remote workers.
3. Wireless Local Area Network (WLAN):
 A WLAN is a LAN that uses wireless technologies like Wi-Fi for communication.
 Offers mobility and flexibility, allowing users to connect to the network without being
physically wired.
 Security and range are limitations compared to wired LANs.
 Suitable for homes, offices, and public spaces where mobility is desired.
4. Personal Area Network (PAN):
 A PAN connects devices within a very small area, such as a few meters.
 Uses technologies like Bluetooth or near field communication (NFC).
 Primarily used for sharing files and resources between personal devices like smartphones,
tablets, and laptops.

5. Campus Area Network (CAN):


 A CAN connects buildings or facilities within a limited geographical area, such as a
university campus or corporate complex.
 Larger than a LAN but smaller than a WAN.
 Offers high speed and reliability, often using fiber optic cables for connection.
 Suitable for connecting buildings and sharing resources within a campus or complex.
6. Metropolitan Area Network (MAN):
 A MAN connects devices across a city or metropolitan area.
 Typically covers an area up to 50 km.
 Uses high-speed technologies like fiber optic cables and microwave links.
 Provides high-bandwidth connectivity for businesses, government agencies, and educational
institutions.
7. Virtual Private Network (VPN):
 A VPN creates a secure encrypted tunnel over a public network, such as the Internet.
 Enables users to connect to a remote network securely.
 Offers privacy and security for remote access and communication.
 Popular among businesses and individuals for accessing resources from anywhere.

Understanding the different types of networks helps choose the right technology for your specific
needs and ensures efficient communication and resource sharing within your network.

Network Communication Types


Network communication refers to the exchange of data between devices connected to a network.
Different types of communication exist, each serving a specific purpose:
1. Unicast:
 One-to-one communication where data is transmitted from a single source device to a single
destination device.
 Similar to sending a private message or making a phone call.
 Most common type of network communication.

2. Multicast:
 One-to-many communication where data is transmitted from a single source device to a group
of destination devices.
 Efficient for sending the same message to multiple recipients simultaneously.
 Used for streaming media, online meetings, and group chats.

3. Broadcast:
 One-to-all communication where data is transmitted from a single source device to all devices
on the network.
 Less common than other types due to its potential to overload the network.
 Used for system announcements, emergency alerts, and network discovery.

4. Anycast:
 One-to-closest communication where data is transmitted from a single source device to the
closest destination device within a group of potential recipients.
 Useful for load balancing and optimizing network performance.
 Used in content delivery networks (CDNs) and server clusters.

5. Geocast:
 One-to-many communication where data is transmitted from a single source device to a
specific geographic area.
 Efficient for targeting messages to specific locations.
 Used for location-based services and targeted advertising.
Choosing the right communication type depends on various factors:
 Number of recipients: Unicast for one recipient, multicast for a specific group, and broadcast
for all devices.
 Data delivery requirements: Unicast for reliable delivery, multicast for efficient delivery to
multiple recipients, and broadcast for reaching all devices.
 Network performance: Unicast and multicast are more efficient than broadcast, which can
overload the network.
 Security considerations: Unicast offers better security as data is sent to a specific recipient,
while multicast and broadcast are less secure.
Understanding the different types of network communication allows you to choose the most
appropriate method for your specific needs.
Introduction to Networking Models
Networking models are conceptual frameworks that describe how data is transmitted across a
network. They provide a structured way to understand the complex process of network
communication and identify different components and functions involved.
There are two primary networking models widely used:
1. Open Systems Interconnection (OSI) Model:
Developed by the International Organization for Standardization (ISO), the OSI model is a seven-
layer model that defines different aspects of network communication in detail. Each layer has specific
functions and interacts with the layers above and below to ensure data is transmitted successfully.
Here are the seven layers of the OSI model:
 Physical Layer: Deals with the physical aspects of the network, such as cables, connectors,
and electrical signals.
 Data Link Layer: Transmits data frames between devices on the network and detects and
corrects errors.
 Network Layer: Routes data packets across the network and determines the best path for data
transmission.
 Transport Layer: Provides reliable and error-free data transfer between applications.
 Session Layer: Establishes, manages, and terminates sessions between devices.
 Presentation Layer: Formats data for transmission and presentation on the recipient device.
 Application Layer: Provides services to applications, such as file sharing, email, and web
browsing.
2. TCP/IP Model:
Developed by the Department of Defense (DoD), the TCP/IP model is a four-layer model commonly
used in the Internet. It focuses on practical implementation and is simpler than the OSI model.
Here are the four layers of the TCP/IP model:
 Network Access Layer: Deals with the physical aspects of the network and transmits data
packets.
 Internet Layer: Routes data packets across the network and determines the best path for data
transmission.
 Transport Layer: Provides reliable and error-free data transfer between applications.
 Application Layer: Provides services to applications, such as file sharing, email, and web
browsing.
While the OSI model offers a more comprehensive and theoretical understanding of network
communication, the TCP/IP model is more practical and widely used in real-world applications.
Benefits of Networking Models:
 Provide a structured framework for understanding network communication.
 Help identify different components and functions involved in data transmission.
 Facilitate troubleshooting and problem-solving in network environments.
 Enable standardization and interoperability between different network devices and
technologies.
Understanding networking models is crucial for anyone who wants to:
 Design, implement, and manage computer networks.
 Diagnose and troubleshoot network problems.
 Develop network applications and services.

Cyber Security Objectives and Services


Cybersecurity aims to protect computer systems, networks, and data from unauthorized access, use,
disclosure, disruption, modification, or destruction. It encompasses a wide range of technologies,
processes, and practices that work together to achieve the following core objectives:
1. Confidentiality:
Ensuring that only authorized individuals and systems can access sensitive information.
 Examples: Protecting user credentials, financial data, medical records, and trade secrets.
 Services: Data encryption, access control, user authentication, and data loss prevention
(DLP).
2. Integrity:
Guaranteeing that data remains accurate, complete, and unaltered throughout its lifecycle.
 Examples: Protecting against unauthorized data modification, deletion, or manipulation.
 Services: Data integrity checks, digital signatures, and intrusion detection and prevention
systems (IDS/IPS).

3. Availability:
Ensuring that authorized users and systems can access and use information and resources when
needed.
 Examples: Preventing denial-of-service (DoS) attacks, system outages, and data breaches.
 Services: Business continuity and disaster recovery (BCDR), network security, and
vulnerability management.

Cybersecurity Services:
To achieve these objectives, organizations can leverage various cybersecurity services offered by
specialized companies or internal security teams. These services typically include:
1. Security Assessments and Audits:
Identifying vulnerabilities and weaknesses in an organization's IT infrastructure and systems.
 Examples: Penetration testing, vulnerability scanning, and security audits.
2. Security Incident and Event Management (SIEM):
Detecting, analyzing, and responding to security incidents and events in real-time.
 Examples: Intrusion detection and prevention systems (IDS/IPS), security information and
event management (SIEM), and security orchestration, automation, and response (SOAR).
3. Security Awareness and Training:
Educating employees and users about cyber threats, best practices, and security policies.
 Examples: Phishing simulations, security awareness training programs, and cybersecurity
workshops.
4. Security Architecture and Design:
Developing and implementing a comprehensive security strategy and architecture aligned with
business needs and risk tolerance.
 Examples: Network segmentation, identity and access management (IAM), and data security
architecture.
5. Security Operations Center (SOC):
A dedicated team responsible for monitoring, analyzing, and responding to security threats and
incidents 24/7.
 Examples: Threat intelligence, security monitoring, and incident response.
6. Managed Security Services (MSS):
Outsourcing all or part of an organization's security operations to a specialized provider.
 Examples: Security monitoring, vulnerability management, and incident response.
Cybersecurity is an ever-evolving field requiring continuous adaptation and improvement to stay
ahead of evolving threats. By understanding the core objectives and leveraging available services,
organizations can build a robust cybersecurity posture that protects their critical assets and ensures
their long-term success.
Other Terms of Cyber Security
In addition to the core objectives and services covered earlier, here are some other important terms
and concepts in cybersecurity:
1. Authentication:
The process of verifying the identity of a user or system attempting to access a resource.
 Examples: Username and password, multi-factor authentication (MFA), single sign-on (SSO).
2. Authorization:
The process of determining what resources and actions a user or system is allowed to access or
perform.
 Examples: Access control lists (ACLs), role-based access control (RBAC).
3. Encryption:
The process of transforming data into an unreadable format to protect its confidentiality.
 Examples: Symmetric encryption, asymmetric encryption, public-key infrastructure (PKI).
4. Firewall:
A network security device that filters traffic coming into and going out of a network based on
predefined rules.
5. Intrusion Detection and Prevention Systems (IDS/IPS):
Network security systems that detect and potentially prevent unauthorized access attempts and other
malicious activity.
6. Malware:
Any software designed to harm a computer system or network.
 Examples: Viruses, worms, trojan horses, ransomware, spyware.
7. Phishing:
A social engineering attack that attempts to trick users into revealing sensitive information, such as
usernames, passwords, or credit card numbers.
8. Ransomware:
A type of malware that encrypts a victim's data and demands payment in exchange for decryption.
9. Social Engineering:
The practice of manipulating people into divulging confidential information or performing actions
that benefit the attacker.
10. Vulnerability:
A weakness in a system that can be exploited by attackers to gain unauthorized access or cause
damage.
11. Zero-Day Vulnerability:
A vulnerability that is unknown to the software vendor and for which no patch is available.
12. Advanced Persistent Threat (APT):
A sophisticated cyberattack group that targets specific organizations over a long period of time.
13. Cyberwarfare:
The use of cyberattacks to achieve military or political objectives.
14. Cybercrime:
Any criminal activity that involves the use of computers or networks.
15. Incident Response (IR):
The process of detecting, containing, and recovering from a security incident.
16. Digital Forensics:
The scientific collection, analysis, and preservation of digital evidence for legal purposes.
17. Threat Intelligence:
The process of gathering information about cyber threats and using it to improve security defenses.
These are just a few of the many terms and concepts in cybersecurity. By understanding these terms,
you can stay informed about the latest threats and trends and make better decisions about protecting
your information and systems.
Myths Around Cyber Security
Cybersecurity is a complex and ever-evolving field, and many myths and misconceptions surround it.
These misconceptions can lead to individuals and organizations taking insufficient precautions and
becoming vulnerable to cyberattacks. Here are some of the most common cybersecurity myths:
Myth 1: Only large organizations are targets of cyberattacks.
While large organizations are often targeted due to their access to valuable data, small businesses are
equally vulnerable. In fact, small businesses are often easier targets because they may have less robust
cybersecurity defenses.
Myth 2: Antivirus software is enough to protect me.
While antivirus software is an important part of cybersecurity, it is not enough on its own. Antivirus
software can only detect known threats, and new threats are emerging all the time. It's crucial to
employ a layered security approach that includes firewalls, intrusion detection and prevention systems
(IDS/IPS), and strong security policies.
Myth 3: I have nothing valuable on my computer, so I don't need to worry about cybersecurity.
Cybercriminals are not just interested in stealing financial information. They may also be interested in
stealing personal data, such as your email address, social security number, or medical records. This
information can be used for identity theft, fraud, and other malicious activities.
Myth 4: If I get a phishing email, I can just delete it and I'll be fine.
Phishing emails can be very convincing, and even the most cautious people can fall victim to them. If
you click on a malicious link or attachment in a phishing email, you could inadvertently install
malware on your computer or give up your personal information.
Myth 5: Security software slows down my computer.
Modern security software is designed to be as lightweight as possible and should not have a
noticeable impact on your computer's performance. If you notice your computer running slow after
installing security software, there may be another issue at play.
Myth 6: I have strong passwords, so I'm safe.
While strong passwords are important, they are not enough to protect you from all cyberattacks.
Hackers can use various techniques to crack passwords, such as brute-force attacks and dictionary
attacks. It's crucial to use a combination of security measures, including strong passwords, multi-
factor authentication, and password managers.
Myth 7: I'm not tech-savvy, so I can't do anything to protect myself online.
Cybersecurity awareness and training are crucial for everyone, regardless of their technical expertise.
There are many resources available online and in libraries that can teach you how to protect yourself
online.
Myth 8: The government will protect us from cyberattacks.
While the government plays a role in cybersecurity, it is ultimately each individual's responsibility to
protect themselves online. You should take steps to secure your personal accounts and devices and be
cautious about the information you share online.
Myth 9: Cybersecurity is too expensive for small businesses.
There are many affordable cybersecurity solutions available for small businesses. It's important to
invest in cybersecurity even if you have a limited budget. The cost of a cyberattack can be far greater
than the cost of implementing basic cybersecurity measures.
Myth 10: There's nothing I can do to prevent cyberattacks.
While it's impossible to completely prevent cyberattacks, there are many things you can do to reduce
your risk. By understanding the myths and misconceptions surrounding cybersecurity, you can take
steps to protect yourself and your organization from online threats.
Remember, cybersecurity is a shared responsibility. By working together, we can create a safer and
more secure online environment for everyone.

Recent cyber attacks (October 30, 2023 - present):


October 30, 2023:
 Municipality IT service provider in Germany suffers ransomware attack: Südwestfalen-IT, a
municipal IT service provider in Germany, was hit by a ransomware attack that disrupted
services for over 110 municipalities and organizations.
November 2023:
 Healthcare system in New Mexico affected by cyber attack: A healthcare system in New
Mexico was impacted by a cyber attack that caused disruptions to patient care and access to
medical records.
 Cyber attack on IT service provider in Germany: Another IT service provider in Germany, this
time focusing on energy supply, was targeted by a cyber attack.
December 2023:
 Cyber attack on a car dealer in the Netherlands: A car dealership in the Netherlands fell victim
to a cyber attack, potentially compromising customer data.
 Water authority in Pennsylvania hit by cyber attack: The Chester Water Authority in
Pennsylvania experienced a cyber attack that temporarily disrupted water service to some
customers.
Ongoing:
 Cyber attacks targeting Sri Lanka's government cloud system: Attackers have been sending
infected links to government workers in Sri Lanka since August, potentially aiming to disrupt
the upcoming G20 summit.
 Malicious actors targeting 30+ WordPress plugins: A Linux malware has been identified
targeting over 30 popular WordPress plugins, putting countless websites at risk.
These are just a few examples of recent cyber attacks. The threat landscape is constantly evolving, and
new attacks are emerging daily.
Generic Conclusion about Attacks
Attacks can have a devastating impact on individuals, organizations, and even entire nations. They
can disrupt critical infrastructure, steal sensitive data, and cause financial losses. In the worst cases,
attacks can even lead to loss of life.
It is important to be aware of the different types of attacks and to take steps to protect yourself. This
includes using strong passwords, keeping your software up to date, and being cautious about the
information you share online.
Organizations can also take steps to protect themselves from attacks by implementing security
measures, such as firewalls, intrusion detection and prevention systems (IDS/IPS), and data
encryption.
By working together, we can create a safer and more secure online environment for everyone.
Here are some additional tips for preventing attacks:
 Be cautious about clicking on links or opening attachments in emails or text messages from
unknown senders.
 Use strong passwords and don't reuse them for multiple accounts.
 Enable two-factor authentication for your online accounts.
 Keep your software up to date, including your operating system, web browser, and antivirus
software.
 Back up your important data regularly.
 Report any suspicious activity to the appropriate authorities.
By following these tips, you can help to reduce the risk of being a victim of an attack.
Why Cyber Security Is Important:
Cybersecurity is crucial in today's digital world for several reasons:
1. Protect Data:
 Data breaches are becoming increasingly common, and cybercriminals are constantly
developing new ways to steal sensitive information. Cybersecurity helps protect your personal
data, financial information, and other sensitive assets from unauthorized access.
2. Maintain Business Continuity:
 Cyberattacks can disrupt critical business operations, leading to lost revenue and productivity.
Cybersecurity helps businesses protect their systems and data from attacks, ensuring business
continuity and minimizing potential damage.
3. Build Trust and Reputation:
 A cyberattack can damage your reputation and erode trust with customers and partners.
Cybersecurity demonstrates your commitment to protecting their data and helps maintain a
positive image.
4. Prevent Financial Loss:
 Cybercrime costs businesses billions of dollars each year. Cybersecurity helps prevent
financial losses due to data breaches, ransomware attacks, and other cyber threats.
5. Protect Critical Infrastructure:
 Cybersecurity is essential for protecting critical infrastructure, such as power grids,
transportation systems, and financial institutions. A cyberattack on these systems could have a
devastating impact on society.
6. Protect National Security:
 Cyberattacks can be used to disrupt government operations, steal classified information, and
even cause physical damage. Cybersecurity is vital for national security and helps protect our
nation from cyber threats.
What is Cyber Security?
Cybersecurity is a broad field that encompasses various technologies, processes, and practices to
protect computer systems, networks, and data from unauthorized access, use, disclosure, disruption,
modification, or destruction.
Here are some key aspects of cybersecurity:
1. Network Security:
 Protecting network infrastructure and devices from unauthorized access and malicious
activity.
2. Data Security:
 Protecting sensitive data from unauthorized access, use, disclosure, or modification.
3. Application Security:
 Building secure applications that are resistant to attacks and vulnerabilities.
4. Cloud Security:
 Protecting data and applications stored and accessed in the cloud.
5. Identity and Access Management (IAM):
 Controlling access to systems and resources based on user identity and permissions.
6. Incident Response:
 Planning and responding to cyber security incidents effectively.
7. Security Awareness and Training:
 Educating users about cyber threats and best practices for protecting themselves online.
8. Risk Management:
 Identifying, analyzing, and mitigating cybersecurity risks.
Cybersecurity is an ongoing and evolving process. As technology and threats evolve, organizations
and individuals must continually adapt and improve their cybersecurity practices to stay ahead of the
curve.
Categories of Cyberattacks
Cyberattacks can be categorized in various ways, depending on the attacker's motive, target, and
methodology. Here are some common categories:
1. Based on Motive:
 Financially motivated: These attacks aim to steal money or valuable data that can be sold for
financial gain. Examples include phishing attacks, ransomware attacks, and bank fraud.
 Politically motivated: These attacks aim to disrupt or influence political processes, spread
propaganda, or damage the reputation of individuals or organizations. Examples include
hacktivism and cyber espionage.
 Ideologically motivated: These attacks are carried out by individuals or groups who want to
promote a particular ideology or cause. Examples include cyberterrorism and denial-of-
service (DoS) attacks targeting websites or organizations with opposing views.
 Personally motivated: These attacks are often carried out by individuals seeking revenge,
harassment, or personal satisfaction. Examples include stalking, doxing, and cyberbullying.
2. Based on Target:
 Individuals: These attacks target individuals to steal their personal information, financial data,
or online accounts. Examples include phishing attacks, identity theft, and social engineering
attacks.
 Organizations: These attacks target businesses, government agencies, and other organizations
to steal sensitive data, disrupt operations, or damage their reputation. Examples include
ransomware attacks, data breaches, and supply chain attacks.
 Critical infrastructure: These attacks target critical infrastructure, such as power grids,
transportation systems, and financial institutions, to cause widespread disruption and damage.
Examples include cyberwarfare attacks and sabotage.
3. Based on Methodology:
 Malware: These attacks involve malicious software designed to harm computer systems or
steal data. Examples include viruses, worms, Trojan horses, and spyware.
 Phishing: These attacks involve tricking users into revealing sensitive information by clicking
on malicious links or opening infected attachments.
 Social engineering: These attacks involve manipulating users into providing sensitive
information or taking actions that benefit the attacker. Examples include pretexting and
baiting.
 Zero-day attacks: These attacks exploit vulnerabilities in software that the software vendor is
unaware of and has not yet patched.
 Denial-of-service (DoS) attacks: These attacks attempt to overload a system or network with
traffic, making it unavailable to legitimate users.
 Insider threats: These attacks are carried out by individuals who have authorized access to a
system or network but use that access to harm the organization.
This is not an exhaustive list, and new attack methods are constantly emerging. However,
understanding these basic categories can help you better understand the different types of cyber
threats and how to protect yourself and your organization.
It is important to note that these categories are not mutually exclusive, and some attacks may fall into
multiple categories. For example, a ransomware attack may be financially motivated, target an
organization, and involve the use of malware.
By staying informed about the latest cyber threats and taking appropriate precautions, individuals and
organizations can help reduce the risk of falling victim to a cyberattack.

You might also like