Fundamentals Of Network Security B

Here we will discuss on Network Security, OSI model, Network Attack and Protection

Last updated 2022-01-10 | 3.8

- To identify information security threats
- To identify the OSI Model layer
- To identify Network Attack

What you'll learn

To identify information security threats
To identify the OSI Model layer
To identify Network Attack
To identify Network Protection Method

* Requirements

* Basic Understanding of Computer
* Basic Understanding of Network

Description

Dear Learners

Are you Preparing for Interview in IT Industry? Don’t be stressed, take our Network Security Course and prepare yourself for your Interview

We know that Network Security is the basic Requirement of IT Company, so it is necessary for every students on IT Industry that he learn the Basic Concept of Network Security. In this Course You Will Learn the fundamentals of Network Security and take the first leap to the world of IT Industry.

This course will covers following topics:

Module 1: In this Module you Understand the Concept of Network Security and types of the Network.

Module 2: In this Module you understand about Types of layer in OSI Model such as application layer, data link layer etc.

Module 3: In this module you understand about the Types of network attack, which harm the computer and network system.

Module 4: In this Module you Understand about the Network Protection.

What Is Network Security?

Network security is the practices and technology a business puts in place to protect its IT infrastructure. This infrastructure, in turn, is made up of all the data, programs, applications, web networks, software and hardware utilized and managed by your business.

What is the Importance of Network Security?

Network security is important for home networks as well as in the business world. Most homes with high-speed internet connections have one or more wireless routers, which could be exploited if not properly secured. A solid network security system helps reduce the risk of data loss and theft.

In This Course we explain every topic in Simple and Easy Way, Definitely You Enjoy this Course.

Sign up now and take this Course. Let's get started.

Who this course is for:

  • Anyone who wants to Start the Career in Network Security
  • IT Students, Who want to update there Knowledge in the Field of Network Security
  • Science Background Students

Course content

7 sections • 8 lectures

Computer network Preview 05:10


What is Computer Network ?

A network consists of two or more computers that are linked in order to share resources, exchange files, or allow electronic communications.


Computer networks are divided into five types, namely:

1. LAN ( Local Area Network )

Local Area Network (LAN), is a private property network in a building. LAN is used to connect personal computers and workstations in the office of a company to exchange information.


2. MAN ( Metropolitan Area Network)

Metropolitan Area Network (MAN), basically a larger LAN. MAN can include company offices that are located adjacent to or also located in an area of the city.


3. WAN ( Wide Area Network )

its scope covers a wide geographical area

( covering a country or even a continent ).


4. Internet

The internet is a communication network that connects one electronic media with other media. Supporting technology standards used are the Transmission Control Protocol or Internet Protocol Suite (abbreviated as the term TCP / IP)


5. Wireless Network

relating to communication between computer systems without using cables. This wireless network is often used for computer networks both at close distances (a few meters, using a device / bluetooth transmitter) and at a distance (via satellite). This field is closely related to the fields of telecommunications, information technology, and computer engineering. Popular types of networks in this wireless network category include: Wireless local area networks (wireless LAN / WLAN), and Wi-Fi.


What is Network Security ?

Network security is policies and practices to prevent and monitor access, misuse, and denial of unauthorized modifications that occur on computer networks.

So Network Security Fundamentals are entry-level security that covers the basic concepts of network security


Network security consists of several concepts, namely :

1. Confidentiality

network security is useful for maintaining the confidentiality of company data.


2. Integrity

Maintain data consistency, accuracy, and trust. The data in it must not be changed by people who do not have rights in it.

3. Availability

make improvements to hardware if needed, and maintain the operating system environment.


4. Authenticatin

The sender of the information can be correctly identified and there is a guarantee that the identity obtained is not fake.

5. Nonrepudiation

that neither sending or receiving information cannot deny the sending and receiving of messages.


OSI Model Preview 08:38

OSI has 7 layers, each layer has a function and has their respective roles

what are they ?

Layer 1: Physical layer

Physical Layer is the first layer in the OSI network reference model. The responsibility is to transmit data bits. it is done from the sender's physical layer and Addressed to the recipient's physical layer.

Layer 2 : Data Link Layer

The Data Link Layer is the second layer from the bottom in the OSI model, which can convert network frames that contain data that detects errors and retransmits failed frames. MAC addresses are also implemented in this layer. some devices such as the Network Interface Card (NIC), layer 2 switches and network bridges also operate here.

Layer 3 : Network Layer

Network Layer has the task of defining IP addresses. This makes each computer can be connected to 1 network. network layer also functions to carry out the routing process and make headers on existing data packages.

Layer 4 : Transport Layer

This layer will break the data into data packages and give serial numbers to the data packages so that they can be rearranged when they reach the destination. at this layer will determine the protocol that will be used to transmit data, for example the TCP protocol. This protocol will send data packets, while also ensuring that the packet is received successfully (acknowledgment), and retransmitting packages that are lost or damaged in the middle of the road.

Layer 5 : Session Layer

Session layer will define how connections can be made, maintained, or destroyed. At this layer there are the Name Recognition, NFS & SMB protocols.

Layer 6 : Presentation Layer

The presentation layer is responsible for the formatting and delivery of information to the application layer for further processing or display. It relieves the application layer of concern regarding syntactical differences in data representation within the end-user systems. An example of a presentation service would be the conversion of an EBCDIC-coded text computer file to an ASCII-coded file.

Layer 7 : Application Layer

Application Layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network. The application layer abstraction is used in both of the standard models of computer networking: the Internet Protocol Suite (TCP / IP) and the OSI model. Although both models use the same terms for their respective highest level layers, the detailed definitions and purposes are different.

Types of network Attack Preview 03:53

There are many types of attacks on computer networks. The following are some of the attacks most often used by attackers.

1. Spoofing

Spoofing is an attack technique that is carried out by the attacker by falsifying data so that the attacker can look like a trusted host. IP spoofing and ARP spoofing in particular may be used to leverage man-in-the-middle attacks against hosts on a computer network. Spoofing attacks which take advantage of TCP / IP suite protocols may be mitigated with the use of firewalls capable of deep packet inspection or by taking measures to verify the identity of the sender or recipient of a message.

2. DDoS ( Distributed Denial of Service )

DDoS Attack is a type of attack on a computer or server on the internet network by consuming resources (resources) that are owned by the computer. So the computer cannot perform its functions by actually being used to save other users to gain access to computers that are the attacked.

3. Sniffing Attack

Sniffing Attack is a data theft technique by monitoring and analyzing each packet of data that is transmitted from the client to the server.

4. SQL Injection

SQL Injection is an attack technique that utilizes website security that allows users to enter data without filtering out malicious characters so that attackers can get access to the application database. Inputs are usually entered into certain parts of the website that are related to the site database.

5. Trojan Horse

Trojan Horse in computer security is an attack that can damage a network or system. With a Trojan horse attack, an attacker can gain access rights to the target and used to find information from the target

Network Protection: Hardware and Software Preview 04:15

After learning types of network attacks, we must also know how to secure a network. Here are some simple things that are useful for protecting the network

1. Physical Security

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.


2. Unified Threat Managemen (UTM)

Unified threat management is an approach to information security where a single hardware or software installation provides multiple security functions. UTM must have a minimum of several converging security features, which is a firewall, Intrusion detection, Intrusion Prevention.

- Firewall is a computer network security system that functions to protect computers from various types of attacks from outside computers. A firewall works by monitoring and controlling all incoming and outgoing network traffic that you do based on established security rules.


- IDS ( Intrusion Detection system ) is a methods that can be used to support suggested activities in the system or network.


- IPS ( Intrusion Prevention System ) is software that works behind a firewall to identify and block threats to the network by assessing every packet that passes based on the network protocol in the application and tracking threats to network security.

Network Protection Method Preview 07:55

Quiz

Now it is Quiz time, Just enjoy Quiz.

Conclusion of the Course Preview 00:53

Conclusion of the Course