Network Security Basics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary goal of network security?

  • To maximize network speed and efficiency.
  • To provide internet access to as many users as possible.
  • To reduce the cost of network hardware.
  • To ensure all machines on a network operate optimally and users only have authorized access. (correct)

Which of the following is NOT a basic function of network security?

  • Preventing unauthorized access and malicious actions.
  • Ensuring uninterrupted service availability.
  • Anticipating failures to secure data.
  • Increasing network bandwidth capacity. (correct)

Why is disabling unnecessary network services an important security measure?

  • It reduces the attack surface available to crackers. (correct)
  • It increases network speed.
  • It simplifies network configuration.
  • It prevents compatibility issues between devices.

How does a closed network enhance security?

<p>By permitting access only to trusted, known parties and sites. (C)</p> Signup and view all the answers

Which network security method is considered outdated and easy to crack?

<p>Wired Equivalent Privacy (WEP). (D)</p> Signup and view all the answers

What is the primary advantage of WPA over WEP?

<p>WPA offers stronger authentication and encryption methods. (B)</p> Signup and view all the answers

Which of the following is NOT a type of authentication factor?

<p>Something a user guesses. (C)</p> Signup and view all the answers

What is the goal of a Denial-of-Service (DoS) attack?

<p>To prevent legitimate users from accessing a network service. (A)</p> Signup and view all the answers

Which of the following network attacks involves intercepting private communications?

<p>Eavesdropping. (C)</p> Signup and view all the answers

How does network security contribute to data protection for clients?

<p>By preventing unauthorized access to personal data. (A)</p> Signup and view all the answers

What is a significant challenge in maintaining network security due to the nature of computer networks?

<p>Networks are shared resources used by various applications with different interests. (A)</p> Signup and view all the answers

Why might implementing the latest security technologies not be effective if the network architecture is flawed?

<p>A flawed architecture can create fundamental vulnerabilities that new technologies cannot address. (B)</p> Signup and view all the answers

What should be analyzed to determine the necessary network security technology?

<p>Security threats and internet protocols. (B)</p> Signup and view all the answers

What critical element is necessary for planning cable routes during network installation?

<p>The network design and actual installation site. (A)</p> Signup and view all the answers

What standards should be followed when performing copper cable splicing?

<p>Electronic Industries Alliance/Telecommunications Industry Association (EIA/TIA) standards. (A)</p> Signup and view all the answers

What principles should be followed during network cable installation, according to the content?

<p>OHS standards and 5S principles. (A)</p> Signup and view all the answers

What directive should be followed when disposing of excess network components and materials?

<p>WEEE directives and 3Rs waste management program. (D)</p> Signup and view all the answers

Which of the following devices is a fundamental component of a network, responsible for providing a physical link between a computer and the network?

<p>Network Interface Card (NIC). (C)</p> Signup and view all the answers

What is the primary function of a router in a network?

<p>To forward data packets between different networks. (A)</p> Signup and view all the answers

Which device is used to strengthen signals, allowing them to travel clearly over longer distances?

<p>Repeater. (D)</p> Signup and view all the answers

Why is shielded twisted pair (STP) cable preferred over unshielded twisted pair (UTP) in environments with high electromagnetic interference?

<p>STP cables block outside interference better than UTP cables. (A)</p> Signup and view all the answers

Which type of network cable is commonly used by television industries?

<p>Coaxial Cable. (D)</p> Signup and view all the answers

What is an advantage of using fiber optic cables over other types of network cables?

<p>They are immune to electrical interference. (B)</p> Signup and view all the answers

What type of network cable is used to connect a PC directly to another PC for a limited two-computer network?

<p>Crossover Cable. (D)</p> Signup and view all the answers

What is the key difference between T568A and T568B wiring standards for RJ45 connectors?

<p>The order of the wire pairs. (A)</p> Signup and view all the answers

What does network configuration primarily involve?

<p>Setting a network's controls, flow, and operation to support network communication. (C)</p> Signup and view all the answers

What is the main purpose of using a patch panel in network infrastructure?

<p>To provide a central point for connecting and routing circuits for monitoring and testing. (D)</p> Signup and view all the answers

What compliance does a Neat Patch panel rack have in terms of industry standards?

<p>Telecom/datacom industry standards. (A)</p> Signup and view all the answers

What is the primary function of a router in managing network traffic?

<p>Directing traffic between computer networks. (A)</p> Signup and view all the answers

What is the initial step in changing a WIFI name and password to protect a wireless network?

<p>Logging into the router's homepage. (A)</p> Signup and view all the answers

After changing the SSID and wireless password on a router, what is the next essential step?

<p>Rebooting the router. (C)</p> Signup and view all the answers

During network testing, what does a lit link light on an RJ45 port indicate?

<p>The network connection is established at the physical layer. (B)</p> Signup and view all the answers

What is the purpose of using the ipconfig command in network troubleshooting?

<p>To display the current network configuration of a computer. (B)</p> Signup and view all the answers

What does the 'ping' command primarily test when troubleshooting a network?

<p>The reachability of a specific IP address or website. (B)</p> Signup and view all the answers

What does an IP address primarily signify in network communication?

<p>The address of both the sender and receiver of packets on a network. (A)</p> Signup and view all the answers

Which type of IP address is typically harder to trace, enhancing security for the device?

<p>Dynamic IP Address. (A)</p> Signup and view all the answers

What role does DHCP (Dynamic Host Configuration Protocol) play in IP addressing?

<p>It automatically assigns dynamic IP addresses to devices. (D)</p> Signup and view all the answers

When setting a static IP address, what initial step is usually required on a Windows computer?

<p>Right-clicking the Wifi or Network icon and opening Network and Sharing Center. (C)</p> Signup and view all the answers

Which of these tests will help ensure your network is functional?

<p>Verify that you can log on. (B)</p> Signup and view all the answers

Flashcards

Network Security

A level of guarantee that all machines in a network are working optimally and users only possess the rights granted to them.

Importance of Network Security

Prevents unauthorized access, data breaches, and ensures services are not interrupted.

Basic Network Security Measure

Disabling unnecessary network services to reduce potential vulnerabilities.

Wi-Fi Protected Access (WPA)

Authenticates users and encrypts information to ensure only authorized individuals access the network.

Signup and view all the flashcards

Wired Equivalent Privacy (WEP)

An older, less secure network security method where a key encrypts information sent across the network.

Signup and view all the flashcards

One-Factor Authentication

A security measure that requires a password to verify the user's identity

Signup and view all the flashcards

Two-Factor Authentication

Verifies identity using something you know, and something you have

Signup and view all the flashcards

Three-Factor Authentication

Verifies identity using something you know, have, and are.

Signup and view all the flashcards

Eavesdropping Attack

Listening in on network communications.

Signup and view all the flashcards

Data Modification Attack

Altering data as it travels across the network.

Signup and view all the flashcards

Identity Spoofing

Pretending to be someone else on the network.

Signup and view all the flashcards

Denial-of-Service (DoS) Attack

Overwhelming a network or server with traffic to disrupt services.

Signup and view all the flashcards

Advantages of Network Security

Protecting personal data, shared information, and preventing external attacks on network computers.

Signup and view all the flashcards

Problems without Network Security

Compromised communication and distributed applications due to shared resources and diverse interests.

Signup and view all the flashcards

Network Security Architecture Evaluation

A systematic approach that evaluates architecture, technology, security policy, and management practices.

Signup and view all the flashcards

Cable Route Planning

Routes for cables planned according to network design and site.

Signup and view all the flashcards

Tool and Equipment Check

Verified tools are used and operated safely.

Signup and view all the flashcards

Network

A collection of computers and related equipment connected so that data can move between them.

Signup and view all the flashcards

Network Interface Card (NIC)

Connects a computer to a network.

Signup and view all the flashcards

Router

Forwards data packets between networks.

Signup and view all the flashcards

Repeater

Strengthens signals.

Signup and view all the flashcards

Network Cable

The medium through which information moves from one network device to another.

Signup and view all the flashcards

Unshielded Twisted Pair (UTP) Cable

Least expensive and most popular network cable, susceptible to interference.

Signup and view all the flashcards

Coaxial Cable

Cable with a copper conductor, plastic insulation, and braided metal shield to block interference.

Signup and view all the flashcards

Fiber Optic Cable

Transmits light rather than electronic signals, eliminating electrical interference.

Signup and view all the flashcards

Wireless LANs

Operate without cables, using radio signals, infrared light, or lasers.

Signup and view all the flashcards

Straight Through Cable

Connects PC to switch/hub

Signup and view all the flashcards

Crossover Cable

Connects PC to PC (limited to two computers only)

Signup and view all the flashcards

RJ45

An 8-position, 8-conductor jack used in Ethernet wiring.

Signup and view all the flashcards

Network Configuration

Setting a network’s controls, flow, and operation.

Signup and view all the flashcards

Patch Panel

Device with jacks for connecting and routing circuits for monitoring, interconnecting, and testing.

Signup and view all the flashcards

Router

Forwards data packets between computer networks and performs traffic directing functions on the Internet.

Signup and view all the flashcards

Testing Your Computer Network

Verifying that a network works as expected.

Signup and view all the flashcards

Link Light

Little red or green light next to the RJ45 port.

Signup and view all the flashcards

Verify Log On

Verifying that you can log on to network computers using a valid domain user account.

Signup and view all the flashcards

ipconfig

Command used to check network configuration.

Signup and view all the flashcards

Ping Command

Command used to test if computers on a network can contact one another.

Signup and view all the flashcards

IP Address

The address given to a computer when it’s connected to a network.

Signup and view all the flashcards

Static IP Address

IP addresses that never change once assigned.

Signup and view all the flashcards

Dynamic IP Address

IP address that changes each time a device logs into a network.

Signup and view all the flashcards

Study Notes

  • Network security aims is to ensure all networked machines function optimally and that users only have authorized rights.
  • It includes preventing unauthorized access, protecting against involuntary harmful actions, securing data against failures, and ensuring uninterrupted services.

Basic Network Security

  • Securing a machine involves preventing unauthorized access once it's connected to a network.
  • Even seemingly unimportant machines can be targeted by automated network scans seeking out security vulnerabilities.
  • Disabling unnecessary network services can enhance security.

Need for Network Security

  • While hacking formerly required advanced programming skills, readily available tools have made it accessible to a broader range of individuals.
  • Complex attack tools combined with open networks have increased the demand for robust security measures and adaptable policies.
  • Disconnecting a network entirely from the outside world is the most effective defense against external attacks.
  • Closed networks limit connectivity to trusted parties and disallow connections to public networks.

Types

  • Wi-Fi Protected Access (WPA) authenticates users and encrypts data.
  • WPA ensures only authorized users access the network and verifies the security key hasn't been altered.
  • Wired Equivalent Privacy (WEP) is an older, less secure method that sets up a network security key for encrypting data.
  • WEP is vulnerable and easily cracked.

Authentication

  • One-factor authentication relies on a single element, like a password.
  • Two-factor authentication uses two elements.
  • Three-factor authentication uses three elements.

Network Attack Methods

  • Eavesdropping involves intercepting network communications.
  • Data modification entails altering data in transit.
  • Identity Spoofing (IP Address Spoofing) involves masquerading as another entity.
  • Password-based attacks aim to compromise user credentials.
  • Denial-of-Service attacks disrupt network service availability.

Advantages of Network Security

  • Protects clients' personal data stored on the network.
  • Secures information exchanged between networked computers.
  • Prevents hacking attempts, viruses, and spyware from harming physical computers.

Problems

  • Computer networks are shared resources used by diverse applications with varying interests.
  • The Internet, due to its open nature, is used by entities with conflicting interests, increasing security risks.
  • Without security measures, network communications and distributed applications are vulnerable.
  • Websites can be defaced via unauthorized remote access and modification of website content.

Network Security Architecture

  • Network infrastructure undergoes years of evolution in response to changing business needs.
  • Security is often addressed as an afterthought during network infrastructure evolution.
  • Advanced security technologies are ineffective if the fundamental security architecture is flawed.
  • Evaluating the current state involves a thorough review of architecture, technology, security policies, management practices, and planned changes.

Conclusion

  • Network security grows in importance with increasing internet usage.
  • Security threats and internet protocols must be analyzed to determine the necessary security technology.
  • Current developments in network security are not very impressive or significant

Install Network Cables

  • Cable routes are planned based on network design and the specific installation site.
  • Obtain necessary network materials, verified them against system requirements and follow established protocols.
  • Obtain necessary tools, equipment, and testing devices, ensuring proper operation and safety via established protocols.
  • Wear appropriate personal protective equipment and adhere to OHS policies and procedures.
  • Perform copper cable splicing according to Electronic Industries Alliance/Telecommunications Industry Association (EIA/TIA) standards.
  • Install network cables and cable raceways following established procedures and requirements.
  • Ensure installation work avoids unnecessary damage and complies with requirements.
  • Follow OHS standards and 5S principles as per enterprise requirements.
  • Dispose of excess components and materials adhering to WEEE directives and 3Rs waste management program.

What is Network

  • A network is a collection of interconnected computers and devices that allows data exchange.
  • Even a single computer connected to the Internet is considered part of a network.
  • The Internet can be seen as a network of networks.

Network Hardware

  • A Network Interface Card (NIC) provides the physical connection between a computer and the network.
  • A Router forwards data packets between Local or Wide Area Networks.
  • A Network Switch determines data movement within large networks.
  • A Repeater strengthens network signals to extend their range.

Network Cable

  • Cable is the medium through which information moves from one network device to another.
  • Networks use different types of cables, determined by the network's topology.

Examples of Network Media

  • Unshielded Twisted Pair (UTP) Cable
  • Shielded Twisted Pair (STP) Cable
  • Coaxial Cable
  • Fiber Optic Cable
  • Wireless LANs

Unshielded Twisted Pair (UTP) Cable

  • UTP Cable is the most affordable and commonly used network media.
  • RJ-45 connectors are the standard for UTP cabling.

Shielded Twisted Pair (STP) Cable

  • STP Cables can help extend the maximum distances of cable.
  • STP cable is less susceptible to interference.

Coaxial Cable

  • Coaxial cable features a central copper conductor insulated from a braided metal shield.
  • The metal shield blocks external interference.
  • Coaxial Cable Commonly used by television industries.

Fiber Optic Cable

  • It Transmits light, not electronic signals, to eliminate electrical interference.
  • Ideal for environments with high electrical interference.

Wireless LANs

  • Wireless LANs use radio signals, infrared light, or lasers for communication.
  • Each device has a transceiver/antenna for data transmission and reception.

Cable Installation Guide

  • Straight Through Cable is connected from PC to switch/hub.
  • Crossover cable is connected from PC to PC (limited to two computers only).

What is RJ45?

  • RJ stands for Registered Jacks
  • RJ-11 is a 6-position, 4-conductor jack used in telephone wiring
  • RJ-45 is a 8-position, 8-conductor jack used in 10BaseT and 100BaseT Ethernet wiring.

Wiring Standards

  • T568A
  • T568B

RJ45 Wiring Guide

  • Guide on how to wire RJ45 connectors

Network Configuration

  • Network configuration involves defining network controls, flow, and operation.
  • It supports network communication and includes setups for hardware, software, and supporting devices.

Patch Panel

  • Used for connecting and routing circuits for monitoring, interconnecting, and testing.
  • Commonly found in computer networking, recording studios, radio, and television.

Patch Panel Cable Management

  • Systems storage solution that maintains industry standards.
  • Telecom/datacom industry standards, and supports proper bends radius requirements.

Router Configuration

  • A router forwards data packets between computer networks and directs internet traffic.
  • Users should change the WIFI name and password in order to protect the wireless network.

How to change the WIFI name and WIFI password

  • Step 1: Login the homepage of the router
  • Step 2: Change the SSID and wireless password
  • Step 3: Reboot the router

Testing your Computer Network

  • It is important to verify that the network works as expected after setting up network infrastructure.

Testing your Computer Network - Checks to Conduct:

  • Check the physical connections by verifying link lights on computers, switches, and routers.
  • Verify that you can log on using valid domain user accounts.
  • Check the network configuration by using the command “ipconfig” or “ipconfig /all”
  • Verify that the computers can ping each other via command prompt "ping" command.
  • Ping another computer (LAN ONLY) using the command PING 192,168.8.100.
  • Ping a website (WAN-Internet) using the command PING WWW.GOOGLE.COM.

What is an IP Address?

  • An IP Address is the address given to your computer when it’s connected to a network
  • The IP Address is a 32-bit number that signifies the address of both the sender and receiver of packets on a network.

The two main types of IP Address

  • Static IP Address does not change once assigned to a device.
  • Dynamic IP Address changes each time the device logs in to a network.

Dynamic IP Address

  • Assigned using DHCP (Dynamic Host Configuration Protocol), and are tough to trace.

How to set a Static IP Address

  • Find out your computer’s Dynamic IP: click the Start button, type cmd and press Enter. Then, enter the command IPCONFIG and press Enter.

How to Permanently set it as your Static IP

  • Right click on Wifi Icon(Laptop) or Network Icon (PC) at the notification bar and select Open Network and Sharing Center.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Network Security Fundamentals
10 questions
Computer Networks and Cybersecurity
18 questions
Network Security Fundamentals Quiz
10 questions
Computer Network Security Technologies
16 questions
Use Quizgecko on...
Browser
Browser