0% found this document useful (0 votes)
7 views

1.3 Network and Data Security

The document discusses various aspects of network and data security, including packet switching, protocols, and network topologies such as bus, ring, star, and mesh. It also covers ethical hacking, security risks like viruses and malware, and methods to reduce risks such as antivirus software and firewalls. Additionally, it highlights the importance of access levels, passwords, and two-factor authentication in maintaining security.

Uploaded by

g4tc5w52mg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

1.3 Network and Data Security

The document discusses various aspects of network and data security, including packet switching, protocols, and network topologies such as bus, ring, star, and mesh. It also covers ethical hacking, security risks like viruses and malware, and methods to reduce risks such as antivirus software and firewalls. Additionally, it highlights the importance of access levels, passwords, and two-factor authentication in maintaining security.

Uploaded by

g4tc5w52mg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Topic 3 - Network and Data Security Packet Switching - Uses routers or switches.

Data may Protocols


be split up into a number of packets. These packets are
transmitted over a network and may take different An agreed format, which allows two devices to
Advantages of a network —Easily share files, software routes to its destination. communicate. The protocol, put simply, is a set of rules.
and hardware between computers. Log in from any A protocol stack is a set of protocols that work together.
connected computer. An administrator can monitor A packet - A collection Each layer supports the one above it and using those
network activity and control security settings. of data that is below it.
transmitted over a
Disadvantages of a network—There is an initial cost
packet-switched
because network devices like routers are required. May HTTP (Hypertext Transfer Protocol) - Can be used to
network.
need to buy and maintain a server. The cost of a transfer multimedia web pages over the Internet.
network manager. Security breaches are more likely Router—Routers work
and malware, such as worms can spread quickly across by storing the
FTP (File Transfer Protocol) - A protocol that can be used
the network. addresses of
when copying a file from one location to another via a
computers on the
network or the Internet. It is typically used for the transfer
network. They then
determine the most of large files.
suitable route.
Bus - The computer systems are each TCP/IP (Transmission Control Protocol/Internet Protocol) -
connected to a single cable, called Hubs—A hub is a small device that allows wired devices
Two protocols that combine to allow communication
the bus. Has terminators on each end to connect to a network.
between computer systems on a network. IP sets out the
to stop packets bouncing back. The Switches—Switches are similar to hubs, with one format of packets and an addressing system. TCP allows
bus carries packets along the cable. important difference - a switch records which computers packets to be sent/received between computer systems.
As the packets arrive at each are connected to which ports.
computer system, it checks the Network Interface Card (NIC) - physical hardware port
destination address contained in the The OSI model is a conceptual model, which
allowing a cable to connect your computer system to
packet to see if it characterises communication between two
the network.
matches its own. endpoints in a network
A wireless access point (WAP) uses a radio transceiver to
allow wireless connections to a network. · Physical - Transfers bits over a physical link.
Ring - Computers are connected in a
loop. Packets are sent around the · Data link layer - Prepares and corrects data to be
ring, being passed from one DNS - A Domain Name System passed to the physical layer.
computer system to the next until is a distributed database that
they arrive at their destination. If matches IP addresses to · Internet layer - Provides network addressing & routing.
there is a problem with the main computer system resources.
cable or connection, the entire network goes down.
One example of this is to match
· Transport layer - Handles data-consistency functions,
an IP address to a human provides a reliable byte stream between two nodes on
Star - In a star network, each friendly domain name such as www.bbc.co.uk. a network
computer system is connected to a
central node, also known as a hub. · If your local DNS server does not store the address of · Session layer - The session layer establishes a
Possible to add more computer the resource you are requesting, it will pass the connection between computers allowing data to be
systems without taking the network request along to another higher level DNS server, such sent between them.
down. Expensive to install. as your Internet Server Provider’s (ISP) DNS server.
· Presentation layer - The purpose of the presentation
· If again the address is not found, you ISPs DNS server layer is to display data in a standard format that other
Mesh - each computer system is will pass the request on to a higher level DNS server devices can accept and understand
connected directly to each of the which may be the DNS server responsible for an entire
· Application layer—The application layer provides
others. Each node relays data for the zone, such as the .co.uk zone.
interfaces to the software
network. All mesh nodes co-operate · This continues until the address is found or the DNS
in the distribution of data in the query fails.
network.
Ethernet Protocol - Describes how
Past Exam Questions
network devices can format data for
transmission using frames and packets.
Also used to define standards for types
of network cabling used at the physical
layer

Wi-Fi Protocol - A term for certain types


of wireless networks that use 802.11
wireless protocols for transmitting data
using electromagnetic waves instead of
cables.

Email Protocols

IMAP - Internet Messaging Access Protocol


stores email messages on a mail server. It
allows the email user to read and handle
email messages as though they were stored locally on
their own computer.

POP3 - Post Office Protocol 3 receives email for a client


and stores it in a single file on the mail server. When the
email client logs onto the mail server the email is transfer
to the users computer.

SMTP - Simple Mail Transfer Protocol is used to deliver


email from the sender to an email server or when email is
delivered from one email server to another. SMTP can
only be used to send emails but not to receive them.

LAN - A network in which the computer systems are all


located relatively close to each other, for example, in
the same building or on the same site, such as a school.

WAN - A network, in which the computers systems are all


located relatively distant from each other, for example,
in different buildings all over the country or in different
countries. The Internet is an example of a WAN.
Topic 3 - Network and Data Security Ethical hacking Malware (Malicious Software)

Ethical hacking is carried out with the permission of the Viruses - A Program that is able to copy itself onto other
4 Main Security Risks
system owner to cover all computer attack techniques. programs often with the intention of damaging data. A
· Hacking, Viruses, Technical Breakdown & virus is transmitted by 'piggybacking' on another
Interception An ethical hacker attempts to bypass system security
program known as a 'vector'.
and search for any weak points that could be exploited
To Reduce Risks: by malicious hackers. This information is then used by Key Logger - Covert programs that capture keyboard
Antivirus Software the system owner to improve system security. inputs and transmits or stores this data for a
A program that can be loaded into memory when Penetration Testing hacker.
the computer is running. It monitors activity on a A sub-set of ethical hacking that deals with the process Worm - a standalone program that self-
computer for the signs of a virus. of testing a network/system to find vulnerabilities that replicates in order to spread to other
Firewalls an attacker could exploit. computers. It does not need a vector.

Software or hardware that controls Targeted - carried out by the organization's IT team and
Spyware - Installed by opening attachments or
the incoming & outgoing network the penetration testing team working together.
downloading infected software. Can be used to
traffic. Data is analysed to decide if it External - to find out if an outside attacker can get in collect stored data without the user’s knowledge.
should be allowed through or not. and how far they can get in once they have gained
access. Trojan Horse - appears to perform a useful
Access Levels function, but also provides a ‘backdoor’ that enables data to be
Internal - to estimate how much damage a dissatisfied
A method used to allow only certain users stolen.
employee could cause.
read and/or write access to data on a computer
Blind - to simulate the actions of a real attacker by
system.
severely limiting the information given to the team
Passwords performing the test. Other Threats
Used to prove a person’s identity to a
computer system, thus allowing SQL Injection - Malicious users can inject SQL commands into a
them access to relevant data. web page input form and compromise data held in a database.

Two-Factor (Double) Authentication DoS Attack - Denial of Service attacks attempt to make your
website and servers unavailable to real users, by swamping a
Users provide 2 forms of ID. Usually something they
system with fake requests.
know (pin) and something the have (bank card). Foot printing
Network Forensics Brute Force Attack - A hacking algorithm, which tries all possible
The first step in the evaluation of system combinations of lowercase and uppercase characters, numbers
This involves monitoring the traffic on a network. At security. It Involves gathering all available and symbols to gain unauthorised access to a computer system.
regular intervals transmitted data packets are copied. information about the computer system or
The copy and information about the packet are then network. Used to limit the technical information IP Address Spoofing - Changing the IP address of a real host so
stored for later analysis. about a system that is publicly available. that a visitor who types in the URL of a real site is taken to a
This is usually processed in batches. The information spoofed web page in order to steal personal details.
gathered can help identify invasive traffic (from
Social Engineering- Involves tricking a user into giving out sensitive
hackers) or to determine where data is being sent.
information such as a password. E.g. Phishing, (an attempt to get
users’ details using fake emails) & Pharming, where users are

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy