Networking Fundamentals
Hardware
Physical devices facilitating network connectivity and communication.
Switches
Connects devices within a single network, enabling communication.
Networking for Cyber Security
Networking is critical in the cybersecurity domain, providing the infrastructure for data exchange while requiring defense against threats and attacks.
Fundamental Concepts
Networking principles are foundational to understanding cyber security.
TCP/IP Stack
The core communication protocols for the internet, involving layers like Link, Internet, Transport, and Application.
OSI Model
A conceptual framework with 7 layers to standardize communications functions.
### Network Topologies Arrangement of various
TCP
Enables reliable, ordered, and error-checked delivery of a stream of bytes between applications.
IP
Responsible for delivering packets from the source host to the destination host based on the IP addresses in packet headers.
Networking for Cyber Security
The study of networking fundamentals to secure information systems against cyber threats.
Networking Basics
Understanding the foundational elements of networking is crucial for cyber security.
OSI Model
Explains the different layers that constitute a complete networking framework.
Network Topologies
Defines the layout patterns of network connections, like star, mesh, and ring.
Protocols
Rules that dictate the communication over networks, such as TCP/IP, UDP, HTTP, etc.
Hardware Components
Devices that facilitate networking like routers, switches, and firewalls.
Cyber Security Principles
Foundational principles ensure integrity, confidentiality, and availability of information.
CIA Triad
Key security model: Confidentiality, Integrity, and Availability.
Risk Management
Identifying and mitigating risks in the network infrastructure.
Access Control
Restricting access to network resources to safeguard information.
Encryption
Scrambling data to prevent unauthorized access.
Network Vulnerabilities
Recognizing and understanding weaknesses in the network to protect against attacks.
Common Attack Types
Methods used by attackers, including DDoS, phishing, and MITM attacks.
Vulnerability Assessment
The process of identifying and quantifying vulnerabilities in a network.
Penetration Testing
Simulating cyber-attacks to test the resiliency of the network security.
Security Patches
Updating systems to correct security vulnerabilities.
Defense Strategies
Proactive measures to protect networks from cyber threats.
Firewalls
Hardware or software that blocks unauthorized access while allowing authorized communications.
Intrusion Detection & Prevention
Systems that monitor network traffic for malicious activities or policy violations.
Antivirus & Anti-malware
Software designed to detect, prevent, and remove malware.
Security Information and Event Management (SIEM)
Tools that provide real-time analysis of security alerts generated by network hardware and applications.
Legal and Ethical Considerations
Understanding the impact of regulations and ethical standards on network security.
Data Protection Laws
Legislation governing the protection of personal data like GDPR and HIPAA.
Ethical Hacking
Authorized testing to improve system security while abiding by legal and moral guidelines.
Incident Response
The organized approach to addressing and managing the aftermath of a security breach.
Privacy Policies
Corporate guidelines that govern data collection, handling, and sharing.