Networking Study Notes 2024 - By Codelivly
Networking Study Notes 2024 - By Codelivly
STUDY NOTES
FOLLOW
www.codelivly.com
LEARN THE BASICS
I. What is Networking?
INTERNET
ROUTER
LAN1 LAN2
WAN
LAN1 LAN3
MAN
LAN4
LAN2
II. IP Addressing
Definition
Types of IP Addresses
IP (Internet Protocol)
Purpose: The primary protocol in the Internet Layer of
the Internet Protocol Suite, responsible for routing
data packets between devices across networks.
Example: Data transmission using IPv4 or IPv6
addresses that identify sending and receiving devices.
Cybersecurity Concern: IP spoofing, where an attacker
disguises as a different IP address to launch attacks
such as session hijacking and man-in-the-middle
(MITM) attacks.
Ethernet
Purpose: Standardizes communications on physical
and data link layers for wired local area networks.
Example: Ethernet is used in office and home networks
to connect devices like computers, printers, and
routers. Cybersecurity Concern: Eavesdropping on
unencrypted Ethernet traffic, where attackers gain
unauthorized access to data flowing through the
network.
Security Protocols
Router
Purpose: Serves as a gateway between different
networks, such as connecting a home network to the
internet. Security Role: Implements Access Control
Lists (ACLs) which restrict or allow traffic based on
predetermined security rules, thus blocking
unauthorized access.
Switch
Purpose: Connects multiple devices on the same Local
Area Network (LAN) to enable communication between
them, handling data transfer within the network.
Firewall
Purpose: A network security device that monitors and
controls incoming and outgoing network traffic based
on predetermined security rules. Types: Packet-
filtering firewalls inspect packets independently and
block them based on source and destination
addresses, ports, or protocols. Stateful firewalls keep
track of active connections and make decisions based
on the state of the connection as well as the set rules.
Application-layer firewalls inspect the content of the
traffic to block specific applications or services and
prevent attacks that operate at the application layer.
Attacker
Targeted
Victim
HTTP GET /index.php
Bot
Bot
MITM (Man-in-the-Middle)
Description: In this attack, an adversary intercepts
communications between two parties to steal data or
insert malicious content, often without either party
knowing. Example: Capturing unencrypted HTTP traffic
to obtain user login credentials. Cybersecurity
Mitigation: Enforcing HTTPS on all sessions, using end-
to-end encryption, and secure VPNs can effectively
thwart MITM attacks.
ARP Spoofing
Description: An attacker sends false ARP (Address
Resolution Protocol) messages over a local network.
This links the attacker’s MAC address with the IP
address of another host, such as the gateway, enabling
the attacker to intercept, modify, or block data to and
from the target. Example: Manipulating network traffic
so that communications intended for a network
gateway are sent to the attacker instead. Cybersecurity
Mitigation: Deploying static ARP entries where feasible,
utilizing network security monitoring tools to detect
unusual ARP traffic, and employing packet filters can
all defend against ARP spoofing.
t
ues
Req
se
pon
Res Network Access Point
Hacker
Req
ues
t
Res
pon Internet
se Victim
DNS Spoofing (DNS Poisoning)
Description: This technique involves corrupting the DNS
resolution process to redirect users to malicious
websites instead of legitimate ones, facilitating data
theft or malware distribution. Example: Altering DNS
entries so users trying to access www.paypal.com are
redirected to a lookalike site that steals their
credentials.
Cybersecurity Mitigation: Implementing
DNSSEC (Domain Name System Security Extensions),
which uses digital signatures to verify the authenticity
of response data, and using reputable DNS providers
can help protect against DNS spoofing.
Phishing
Description: A form of social engineering where
attackers deceive victims into revealing personal,
financial, or security data. This is often achieved
through counterfeit communications that appear to
come from trusted sources. Example: Receiving an
email that mimics the style and branding of a legitimate
bank, requesting users to verify account details via a
deceptive link. Cybersecurity Mitigation: Training users
to recognize phishing attempts, employing advanced
email filtering
solutions, and implementing
multi-factor authentication (MFA) are effective
strategies to minimize phishing risks.
VIII. Cybersecurity Best Practices for Networking
Use Encryption
Apply Strong Authentication
Monitor Network Traffic
Segment Networks
Regularly Patch Devices and Software
Use Firewalls and IDS/IPS
Implement Access Control
Backup Critical Data
Educate Users
Secure Wireless Networks
FOLLOW