Study
Network Standards and Protocols
Different network standards and protocols are necessary so that different devices can communicate effectively. Standards set by international organisations such as the ANSI, IEC, ISO and IEEE ensure compatibility between technologies while protocols dictate how data is transmitted, received and …
Read MoreBinary Conversion of IPv4 Octets
Convert 111101 to decimal
128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 |
---|---|---|---|---|---|---|---|
1 | 1 | 1 | 1 | 0 | 1 |
Workings out
Referencing the above …
Read MoreCharacteristics of IP Addresses
IPv4
IPv4 has 5 classes from A to E. Class A is for large enterprises and the first byte or octet is the network prefix. Class B is for medium-sized enterprises and the first two bytes are the network prefix. Class C is for small networks and the first three bytes are the network prefix. Class D …
Read MoreNetworking Components and Technologies
Networking components
Domain controllers
A domain controller (DC) is a server on the AD and controls one or more domains, which are specific areas in the network. Domain controllers are the gatekeepers that authenticate users’ credentials so they can access their authorised resources stored on …
Read MoreTypes of Networks
Area networks
LAN
A LAN is a private network that connects endpoints which are physically close together such as computers in a building. Computers can be connected to each other directly or via a switch. Within a LAN may have sub-networks or subnets which can be demonstrated in a company with many …
Read MoreProcedures to Secure a Network
The first step to securing a network is to look at the business objectives and update the inventory of IT assets so the organisation knows (a) what the budget is, (b) the acceptable and intolerable risks in relation to the business objectives, industry regulations and potential damages, and (c) …
Read MoreActions to Minimise Network Security Threats
Backups
An organisation can back up data by following the 3-2-1 rule: have three copies of data at any time, i.e. the original working data and at least two copies; stored in two different media, e.g. hard drive or in the cloud; and keep one copy offsite in case of a site-specific disaster such as …
Read MoreMinimise Network Security Threats With Hardware and Software
Hardware
A firewall can be used to examine incoming and outgoing data from the local area network (LAN) to
the wide area network (WAN) to see if the data packets meet the criteria according to its list of
permissions such as approved IP address and ports.
Physical authenticators such as mobile …
Motives Behind Network Attacks
Financial
The main driver of a network attack is to extort money and make the time spent in research worthwhile. People with a high-profile and in the public eye make obvious targets for spear phishing campaigns. Bank balances and HR records are useful information to know how much a company or …
Read MoreTypes and Sources of Network Attacks
Types
Passive attacks
A passive attack is one that quietly collects information on a system without encrypting or altering
data. It is a precursor to an active attack in the reconnaissance phase and is hard to detect until
an active attack occurs.
Phishing is a method to lure a victim into …
Risks Involved in a Data Breach
Data breaches
A data breach is when data confidentiality is compromised due to an unauthorised access to the computer system or database in a cyberattack, or theft of a physical storage medium like a USB flash drive. Data may be sensitive or non-sensitive including business secrets, personal …
Read MoreEthical Hacking Tools and Techniques
Physical perspective
Drones can be used to obtain information from the sky. It can be used to remotely shoulder surf and record sensitive login credentials being typed. Further, it can be used to capture the movement of people such as smokers and security guards or study a building to see where the …
Read More