SCT Unit - 1
SCT Unit - 1
Network and Information security Fundamentals: Network Basics, Network Components, Network
Types, Network Communication Types. Introduction to Networking Models, Cyber Security
Objectives and Services, Other Terms of Cyber Security, Myths Around Cyber Security, Myths
Around Cyber Security, Recent Cyber Attacks, Generic Conclusion about Attacks, Why and What is
Cyber Security, Categories of Attack
Network Basics
A network is a group of interconnected devices that can communicate with each other. These
devices can be computers, servers, printers, or other devices. Networks can be small, such as
a home network, or large, such as the Internet. Networks can be wired or wireless.
Wired networks use cables to connect devices. Wireless networks use radio waves to connect
devices.
2. Cables:
Cables provide the physical medium for data transmission between devices. Different types of
cables exist, including twisted-pair, coaxial, and fiber optic, each with its own advantages and
limitations.
3. Hubs:
Hubs are central devices that connect multiple network devices together. They receive data
packets from one device and retransmit them to all other connected devices.
4. Switches:
Switches are more intelligent than hubs and can learn the MAC addresses of connected
devices. This allows them to direct data packets only to the intended recipient, improving
network efficiency and reducing congestion.
5. Routers:
Routers connect multiple networks and serve as the traffic directors. They analyze data
packets and determine the optimal path for forwarding them to their destination networks.
6. Modem:
A modem modulates and demodulates signals, enabling communication between devices over
different media like telephone lines or cable lines.
7. Access Points:
Access points provide wireless connectivity to devices within a specific area. They act as
bridges between wired and wireless networks, allowing wireless devices to connect to the
network and access its resources.
8. Repeater:
Repeaters amplify weakened signals, extending the reach of a network and ensuring reliable
transmission across longer distances.
9. Servers:
Servers are powerful computers that provide resources and services to other network devices,
such as file storage, printing, and email.
10. Clients:
Clients are devices that connect to the network to access resources and services provided by
servers. These can be desktops, laptops, smartphones, tablets, or any device capable of
network communication.
These are just some of the essential network components. The specific components and their
configuration will vary depending on the size and complexity of the network.
Network Types
Computer networks can be categorized based on their size, scope, and technology used. Here are
some of the most common network types:
1. Local Area Network (LAN):
A LAN connects devices in a geographically limited area, such as a home, office, or school.
Typically covers an area up to 10 km.
Uses technologies like Ethernet cables or Wi-Fi for connection.
Offers high speed and data transfer rates.
Suitable for sharing resources like printers, files, and applications.
2. Wide Area Network (WAN):
A WAN connects devices across a large geographical area, such as a city, state, or even the
entire world.
Can span thousands of kilometers.
Uses technologies like leased lines, satellite links, and public networks like the Internet for
connection.
Offers lower speed than LANs but enables long-distance communication.
Suitable for connecting geographically distributed offices, branches, and remote workers.
3. Wireless Local Area Network (WLAN):
A WLAN is a LAN that uses wireless technologies like Wi-Fi for communication.
Offers mobility and flexibility, allowing users to connect to the network without being
physically wired.
Security and range are limitations compared to wired LANs.
Suitable for homes, offices, and public spaces where mobility is desired.
4. Personal Area Network (PAN):
A PAN connects devices within a very small area, such as a few meters.
Uses technologies like Bluetooth or near field communication (NFC).
Primarily used for sharing files and resources between personal devices like smartphones,
tablets, and laptops.
Understanding the different types of networks helps choose the right technology for your specific
needs and ensures efficient communication and resource sharing within your network.
2. Multicast:
One-to-many communication where data is transmitted from a single source device to a group
of destination devices.
Efficient for sending the same message to multiple recipients simultaneously.
Used for streaming media, online meetings, and group chats.
3. Broadcast:
One-to-all communication where data is transmitted from a single source device to all devices
on the network.
Less common than other types due to its potential to overload the network.
Used for system announcements, emergency alerts, and network discovery.
4. Anycast:
One-to-closest communication where data is transmitted from a single source device to the
closest destination device within a group of potential recipients.
Useful for load balancing and optimizing network performance.
Used in content delivery networks (CDNs) and server clusters.
5. Geocast:
One-to-many communication where data is transmitted from a single source device to a
specific geographic area.
Efficient for targeting messages to specific locations.
Used for location-based services and targeted advertising.
Choosing the right communication type depends on various factors:
Number of recipients: Unicast for one recipient, multicast for a specific group, and broadcast
for all devices.
Data delivery requirements: Unicast for reliable delivery, multicast for efficient delivery to
multiple recipients, and broadcast for reaching all devices.
Network performance: Unicast and multicast are more efficient than broadcast, which can
overload the network.
Security considerations: Unicast offers better security as data is sent to a specific recipient,
while multicast and broadcast are less secure.
Understanding the different types of network communication allows you to choose the most
appropriate method for your specific needs.
Introduction to Networking Models
Networking models are conceptual frameworks that describe how data is transmitted across a
network. They provide a structured way to understand the complex process of network
communication and identify different components and functions involved.
There are two primary networking models widely used:
1. Open Systems Interconnection (OSI) Model:
Developed by the International Organization for Standardization (ISO), the OSI model is a seven-
layer model that defines different aspects of network communication in detail. Each layer has specific
functions and interacts with the layers above and below to ensure data is transmitted successfully.
Here are the seven layers of the OSI model:
Physical Layer: Deals with the physical aspects of the network, such as cables, connectors,
and electrical signals.
Data Link Layer: Transmits data frames between devices on the network and detects and
corrects errors.
Network Layer: Routes data packets across the network and determines the best path for data
transmission.
Transport Layer: Provides reliable and error-free data transfer between applications.
Session Layer: Establishes, manages, and terminates sessions between devices.
Presentation Layer: Formats data for transmission and presentation on the recipient device.
Application Layer: Provides services to applications, such as file sharing, email, and web
browsing.
2. TCP/IP Model:
Developed by the Department of Defense (DoD), the TCP/IP model is a four-layer model commonly
used in the Internet. It focuses on practical implementation and is simpler than the OSI model.
Here are the four layers of the TCP/IP model:
Network Access Layer: Deals with the physical aspects of the network and transmits data
packets.
Internet Layer: Routes data packets across the network and determines the best path for data
transmission.
Transport Layer: Provides reliable and error-free data transfer between applications.
Application Layer: Provides services to applications, such as file sharing, email, and web
browsing.
While the OSI model offers a more comprehensive and theoretical understanding of network
communication, the TCP/IP model is more practical and widely used in real-world applications.
Benefits of Networking Models:
Provide a structured framework for understanding network communication.
Help identify different components and functions involved in data transmission.
Facilitate troubleshooting and problem-solving in network environments.
Enable standardization and interoperability between different network devices and
technologies.
Understanding networking models is crucial for anyone who wants to:
Design, implement, and manage computer networks.
Diagnose and troubleshoot network problems.
Develop network applications and services.
3. Availability:
Ensuring that authorized users and systems can access and use information and resources when
needed.
Examples: Preventing denial-of-service (DoS) attacks, system outages, and data breaches.
Services: Business continuity and disaster recovery (BCDR), network security, and
vulnerability management.
Cybersecurity Services:
To achieve these objectives, organizations can leverage various cybersecurity services offered by
specialized companies or internal security teams. These services typically include:
1. Security Assessments and Audits:
Identifying vulnerabilities and weaknesses in an organization's IT infrastructure and systems.
Examples: Penetration testing, vulnerability scanning, and security audits.
2. Security Incident and Event Management (SIEM):
Detecting, analyzing, and responding to security incidents and events in real-time.
Examples: Intrusion detection and prevention systems (IDS/IPS), security information and
event management (SIEM), and security orchestration, automation, and response (SOAR).
3. Security Awareness and Training:
Educating employees and users about cyber threats, best practices, and security policies.
Examples: Phishing simulations, security awareness training programs, and cybersecurity
workshops.
4. Security Architecture and Design:
Developing and implementing a comprehensive security strategy and architecture aligned with
business needs and risk tolerance.
Examples: Network segmentation, identity and access management (IAM), and data security
architecture.
5. Security Operations Center (SOC):
A dedicated team responsible for monitoring, analyzing, and responding to security threats and
incidents 24/7.
Examples: Threat intelligence, security monitoring, and incident response.
6. Managed Security Services (MSS):
Outsourcing all or part of an organization's security operations to a specialized provider.
Examples: Security monitoring, vulnerability management, and incident response.
Cybersecurity is an ever-evolving field requiring continuous adaptation and improvement to stay
ahead of evolving threats. By understanding the core objectives and leveraging available services,
organizations can build a robust cybersecurity posture that protects their critical assets and ensures
their long-term success.
Other Terms of Cyber Security
In addition to the core objectives and services covered earlier, here are some other important terms
and concepts in cybersecurity:
1. Authentication:
The process of verifying the identity of a user or system attempting to access a resource.
Examples: Username and password, multi-factor authentication (MFA), single sign-on (SSO).
2. Authorization:
The process of determining what resources and actions a user or system is allowed to access or
perform.
Examples: Access control lists (ACLs), role-based access control (RBAC).
3. Encryption:
The process of transforming data into an unreadable format to protect its confidentiality.
Examples: Symmetric encryption, asymmetric encryption, public-key infrastructure (PKI).
4. Firewall:
A network security device that filters traffic coming into and going out of a network based on
predefined rules.
5. Intrusion Detection and Prevention Systems (IDS/IPS):
Network security systems that detect and potentially prevent unauthorized access attempts and other
malicious activity.
6. Malware:
Any software designed to harm a computer system or network.
Examples: Viruses, worms, trojan horses, ransomware, spyware.
7. Phishing:
A social engineering attack that attempts to trick users into revealing sensitive information, such as
usernames, passwords, or credit card numbers.
8. Ransomware:
A type of malware that encrypts a victim's data and demands payment in exchange for decryption.
9. Social Engineering:
The practice of manipulating people into divulging confidential information or performing actions
that benefit the attacker.
10. Vulnerability:
A weakness in a system that can be exploited by attackers to gain unauthorized access or cause
damage.
11. Zero-Day Vulnerability:
A vulnerability that is unknown to the software vendor and for which no patch is available.
12. Advanced Persistent Threat (APT):
A sophisticated cyberattack group that targets specific organizations over a long period of time.
13. Cyberwarfare:
The use of cyberattacks to achieve military or political objectives.
14. Cybercrime:
Any criminal activity that involves the use of computers or networks.
15. Incident Response (IR):
The process of detecting, containing, and recovering from a security incident.
16. Digital Forensics:
The scientific collection, analysis, and preservation of digital evidence for legal purposes.
17. Threat Intelligence:
The process of gathering information about cyber threats and using it to improve security defenses.
These are just a few of the many terms and concepts in cybersecurity. By understanding these terms,
you can stay informed about the latest threats and trends and make better decisions about protecting
your information and systems.
Myths Around Cyber Security
Cybersecurity is a complex and ever-evolving field, and many myths and misconceptions surround it.
These misconceptions can lead to individuals and organizations taking insufficient precautions and
becoming vulnerable to cyberattacks. Here are some of the most common cybersecurity myths:
Myth 1: Only large organizations are targets of cyberattacks.
While large organizations are often targeted due to their access to valuable data, small businesses are
equally vulnerable. In fact, small businesses are often easier targets because they may have less robust
cybersecurity defenses.
Myth 2: Antivirus software is enough to protect me.
While antivirus software is an important part of cybersecurity, it is not enough on its own. Antivirus
software can only detect known threats, and new threats are emerging all the time. It's crucial to
employ a layered security approach that includes firewalls, intrusion detection and prevention systems
(IDS/IPS), and strong security policies.
Myth 3: I have nothing valuable on my computer, so I don't need to worry about cybersecurity.
Cybercriminals are not just interested in stealing financial information. They may also be interested in
stealing personal data, such as your email address, social security number, or medical records. This
information can be used for identity theft, fraud, and other malicious activities.
Myth 4: If I get a phishing email, I can just delete it and I'll be fine.
Phishing emails can be very convincing, and even the most cautious people can fall victim to them. If
you click on a malicious link or attachment in a phishing email, you could inadvertently install
malware on your computer or give up your personal information.
Myth 5: Security software slows down my computer.
Modern security software is designed to be as lightweight as possible and should not have a
noticeable impact on your computer's performance. If you notice your computer running slow after
installing security software, there may be another issue at play.
Myth 6: I have strong passwords, so I'm safe.
While strong passwords are important, they are not enough to protect you from all cyberattacks.
Hackers can use various techniques to crack passwords, such as brute-force attacks and dictionary
attacks. It's crucial to use a combination of security measures, including strong passwords, multi-
factor authentication, and password managers.
Myth 7: I'm not tech-savvy, so I can't do anything to protect myself online.
Cybersecurity awareness and training are crucial for everyone, regardless of their technical expertise.
There are many resources available online and in libraries that can teach you how to protect yourself
online.
Myth 8: The government will protect us from cyberattacks.
While the government plays a role in cybersecurity, it is ultimately each individual's responsibility to
protect themselves online. You should take steps to secure your personal accounts and devices and be
cautious about the information you share online.
Myth 9: Cybersecurity is too expensive for small businesses.
There are many affordable cybersecurity solutions available for small businesses. It's important to
invest in cybersecurity even if you have a limited budget. The cost of a cyberattack can be far greater
than the cost of implementing basic cybersecurity measures.
Myth 10: There's nothing I can do to prevent cyberattacks.
While it's impossible to completely prevent cyberattacks, there are many things you can do to reduce
your risk. By understanding the myths and misconceptions surrounding cybersecurity, you can take
steps to protect yourself and your organization from online threats.
Remember, cybersecurity is a shared responsibility. By working together, we can create a safer and
more secure online environment for everyone.