Edexcel IAL IT Network Note

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Network Components

Network components are hardware devices that are used to connect and manage communication
between different devices in a network. Some of the commonly used network components are:

Switch: A switch is a networking device that connects multiple devices on a network and allows them to
communicate with each other. It operates at the data link layer of the OSI model and uses MAC
addresses to forward data.

Bridge: A bridge is a device that connects two or more network segments together and forwards data
between them. It operates at the data link layer of the OSI model and uses MAC addresses to forward
data.

Gateway: A gateway is a device that connects two or more networks together and allows communication
between them. It operates at the network layer of the OSI model and uses IP addresses to forward data.

Router: A router is a device that connects multiple networks together and forwards data between them.
It operates at the network layer of the OSI model and uses IP addresses to forward data.

Multifunction device: A multifunction device is a networking device that combines the functionality of
multiple devices such as a router, switch, and firewall in one device.

Modem: A modem is a device that connects a computer or router to the internet over a phone line,
cable, or fiber optic line.

Repeater: A repeater is a device that amplifies and retransmits signals to extend the range of a network.

Server: A server is a computer that provides services or resources to other devices on a network. It can
be a file server, print server, or application server.

Network interface card (NIC): A network interface card is a hardware device that connects a computer to
a network. It provides a physical interface between the computer and the network.

Wireless access point: A wireless access point is a device that allows wireless devices to connect to a
wired network. It operates at the physical and data link layers of the OSI model.

Hub: A hub is a networking device that connects multiple devices on a network and allows them to
communicate with each other. It operates at the physical layer of the OSI model and broadcasts data to
all connected devices.

Securing Network
Firewall
Securing networks using firewall is a commonly used method to protect a network from unauthorized
access and potential cyber threats. A firewall is a security device that monitors and controls incoming
and outgoing network traffic based on a set of predefined rules. These rules can be configured to allow
or block specific types of traffic, such as web browsing, email, or file sharing.
Firewalls can be hardware or software-based, and they operate at the network layer of the OSI model.
They can be configured to perform a variety of security functions, including packet filtering, intrusion
detection, and prevention, and virtual private network (VPN) connectivity.

Packet filtering is the most basic function of a firewall. It inspects packets of data as they pass through
the firewall and either allows or blocks them based on the configured rules. This can be based on criteria
such as the source and destination IP address, port number, or protocol type.

Security settings

Securing networks using security settings involves implementing a range of settings and configurations
designed to prevent unauthorized access to a network and protect against cyber threats. Some of the
key security settings that can be used to secure a network include:

Password policies: Password policies help to ensure that users choose strong passwords that are difficult
to guess. This can include requirements for password length, complexity, and expiration.

User access controls: User access controls can be used to limit access to network resources to authorized
users only. This can include role-based access control (RBAC), which restricts access based on a user's job
function.

Encryption: Encryption is the process of converting data into a secret code to prevent unauthorized
access. Encryption can be used to protect data both in transit (e.g. when sent over the internet) and at
rest (e.g. when stored on a hard drive).

Network segmentation: Network segmentation involves dividing a network into smaller subnetworks to
reduce the impact of a security breach. By isolating different parts of the network, it becomes more
difficult for an attacker to move laterally and gain access to sensitive data.

Patch management: Patch management involves regularly applying software updates to fix known
security vulnerabilities. This can help to prevent attackers from exploiting known weaknesses in software
applications and operating systems.

Firewall settings: Firewall settings can be used to block traffic from unauthorized sources and prevent
certain types of traffic from entering or leaving the network.

Anti-Malware
Securing networks using anti-malware involves implementing software tools designed to detect and
prevent malware infections on network devices and systems. Malware, or malicious software, is a type of
software that is designed to cause harm to computer systems, steal sensitive data, or take control of a
network.

Anti-malware software is typically installed on individual devices, such as laptops or desktop computers,
as well as on servers and other network devices. The software scans for known types of malware and can
detect new, previously unknown threats through behavior-based analysis.
Some of the key features of anti-malware software include:

Real-time scanning: Anti-malware software continuously monitors network activity in real-time, scanning
for malware infections and suspicious activity.

Malware removal: Anti-malware software can remove malware infections from devices and systems,
helping to prevent further damage to the network.

Threat intelligence: Anti-malware software often includes access to threat intelligence databases, which
provide information on known malware threats and their behaviors.

Automated updates: Anti-malware software automatically updates itself with the latest malware
definitions and security patches to stay ahead of new threats.

Email filtering: Anti-malware software can scan incoming and outgoing email traffic for known malware
threats and block or quarantine infected emails.

Authentication Types
Securing networks using authentication types involves implementing various types of authentication
mechanisms to verify the identity of users and devices attempting to access the network. Authentication
is the process of verifying that a user or device is who or what it claims to be, before granting access to
the network.

There are several types of authentication mechanisms that can be used to secure a network, including:

Password-based authentication: Password-based authentication is the most common type of


authentication mechanism, where users are required to provide a username and password to access the
network.

Two-factor authentication (2FA): Two-factor authentication is a more secure method of authentication


that requires users to provide two forms of identification, such as a password and a security token or
biometric factor.

Certificate-based authentication: Certificate-based authentication involves the use of digital certificates


to authenticate users or devices. A digital certificate is a cryptographic document that verifies the
identity of the user or device.

Biometric authentication: Biometric authentication uses physical or behavioral characteristics, such as


fingerprints or voice recognition, to verify the user’s or device’s identity.

Single sign-on (SSO): Single sign-on allows users to authenticate once and access multiple systems or
applications without having to re-enter their credentials.

Encryption techniques
Securing networks using encryption techniques involves the use of cryptographic algorithms to protect
sensitive data as it is transmitted across a network. Encryption is the process of converting plain text
data into ciphertext, which can only be deciphered by someone who has the correct decryption key.
There are several types of encryption techniques that can be used to secure a network, including:

Symmetric encryption: Symmetric encryption uses a single key to encrypt and decrypt data. This key
must be kept secret and shared only between the sender and receiver of the data.

Asymmetric encryption: Asymmetric encryption uses two keys - a public key and a private key - to
encrypt and decrypt data. The public key can be shared freely, while the private key must be kept secret.

Hashing: Hashing is a one-way encryption technique that generates a unique fixed-length output, or
hash, from any input data. The hash is used to verify the integrity of the data, as any changes to the
input data will result in a different hash value.

Transport Layer Security (TLS)/Secure Sockets Layer (SSL): TLS/SSL is a protocol that provides secure
communication over a network. It uses a combination of symmetric and asymmetric encryption
techniques to encrypt data between the client and server.

Physical controls
Securing networks using physical controls involves implementing measures to physically protect the
network and its components from unauthorized access or damage. Physical security controls are an
important aspect of overall network security, as they can help prevent physical theft or damage to
network devices and infrastructure.

Some examples of physical controls that can be used to secure a network include:

Access controls: Access controls such as locks, badges, and biometric authentication can be used to
restrict access to network devices and infrastructure.

Surveillance cameras: Surveillance cameras can be used to monitor the physical space around network
devices and infrastructure, and can provide evidence of any unauthorized access or damage.

Environmental controls: Environmental controls such as temperature and humidity sensors can be used
to monitor the physical conditions of the network environment, and can alert administrators to any
conditions that may cause damage to network devices.

Redundant power supplies: Redundant power supplies can be used to ensure that network devices
remain operational in the event of a power outage or other power-related issue.

Backup and recovery systems: Backup and recovery systems can be used to ensure that

You might also like