Module 9. Securing Network Connection

 

 Securing Network Connection



DEFINITION

A network is defined as a group of computers and other devices connected with each other to exchange data

TYPES
  1. Local Area Network (LAN): A network within a limited area (e.g., office or school) that connects computers and devices to share data and resources like printers and storage.
  2. Wide Area Network (WAN): A large-scale network that connects multiple LANs across different geographical areas, allowing communication between distant users and systems.
  3. Virtual Private Network (VPN): A secure, private connection between computers or networks over the internet, using tunneling to create a temporary, encrypted communication channel.
  4. Ethernet: When users plug in a cable into their computers to connect to the Internet, this method of Internet connection.
  5. Home Networking: Process of interconnecting all devices in a home together and with the Internet in general; these devices include computers, laptops, mobile phones, and tablets.
  6. Wireless Network (such as Wifi): Wireless networks are computer networks that are not connected by cables of any type.

WIRELESS NETWORK

  1. Wireless local area network (WLAN): WLANs allow users in a local area, such as a university campus, library, or an office, to form a network and gain access to the Internet
  2. Wireless metropolitan area network (WMAN): WMANs connect computers within a geographic radius larger than LANs but smaller than WWANs. For example, computers in different branches of a bank in the same city
  3. Wireless wide area network (WWAN): WWANs cover large areas such as neighboring towns and cities
  4. Wireless personal area network (WPAN): WPANs connect devices over a short span, generally within a person’s reach; for example, Bluetooth
THREATS
  • Configuration problems: Simple configuration problems are often the cause of threats to wireless network security. Novice users, set up devices on their own without completely understanding the process to have quick access to Wi-Fi. This usually opens up their networks to external use without their knowledge.
  • Evil twin: It is a rogue Wi-Fi network setup that looks like a normal Wi-Fi network. For example, it might have the same name as the one in the local coffee shop. Hackers create this network to lure users; once users log in, they open themselves to a host of attacks.
  • War driver: A war driver attack is when someone connects to a non-secure Wi-Finetwork and breaches data being exchanged on it. This attack can be performed by anyone within a router’s range.

SECURING NETWORK CONNECTIONS
  • Firewall: Acts as the first line of defense in a network by blocking harmful traffic from the Internet. However, it has limitations—it can't prevent internal access to malicious sites, stop social engineering, or detect all vulnerabilities.

  • Antivirus: Software that detects and removes malware. It stays updated automatically to fight new threats. Even cautious users need antivirus protection due to risks like zero-day exploits. Popular antivirus programs include McAfee, Norton, AVG, and Avast.

  • Encryption: Protects digital data by encoding it so only authorized users can read it. Strong passwords are essential for effective encryption.

  • Browsing Secure Websites: Enhances online safety by ensuring data is encrypted during transmission. Secure sites can be identified by a lock icon in the browser and a URL starting with "https://".



Comments

Popular posts from this blog

Module 4. Internet Security

Module 2. Securing Operating System

Module 12. Secure Remote Work