Network Fundamentals and Security
INTRODUCTION TO NETWORKS AND SECURITY DEVICES
Internet
A global computer network linking information and people.
Network
A system of interconnected computers and devices enabling electronic communication, resource sharing, and file exchange.
COMPUTER NETWORKS
Definition
An interconnected collection of autonomous (independent) computers without a master/slave relationship.
Components of a Network
Sending Computer System and Equipment
Receiving Computer System and Equipment
Medium: Communications medium (e.g., cables) connecting systems.
Signal: Represents data being transmitted.
USES AND ADVANTAGES OF COMPUTER NETWORKS
Benefits
Improved communication capabilities.
Reduced barriers of time and distance for information access.
Increased access to information for workers.
Freedom of location for companies.
High reliability and continuity.
Sharing of costly resources (e.g., hardware, software).
Applications
Resource Sharing: Hardware (printers), Software (applications), Information (databases).
Communication: Email, message broadcasting, remote computing, distributed processing.
Characteristics of Networks
Fault Tolerance: Capability to continue functioning despite failures.
Scalability: Ability to grow and manage additional devices.
Quality of Service: Level of performance in data transmission.
Security: Protecting data and resources from unauthorized access.
REQUIREMENTS FOR INTERNET CONNECTION
Physical Connection: Physical medium connecting devices.
Logical Connection: Software communication protocols for data interpretation.
NETWORK CONNECTIVITY DEVICES
Devices transmitting data between end-user devices:
Repeater: This is used to regenerate the signal.
Hub: This functions similarly as a repeater by means of a process known as concentration.
Bridge: This converts network transmission data formats as well as performs basic data transmission management.
Switch: This adds more intelligence to data transfer management.
Router: This directs data packets through networks.
Cloud: This provides integrated network resources for connectivity.
GATEWAY
A node for data transfer, essential for network communication.
FIREWALL
Software or hardware that protects against unauthorized access, hackers, and malware.
NETWORK TOPOLOGY
Definition
Structure/layout of a network (physical and logical).
Affects data communication and device arrangement.
Types of Topologies
Bus Topology: All devices share a single cable.
Ring Topology: Each device connects to two others, forming a ring.
Star Topology: Devices connect to a central hub.
Mesh Topology: Every device connects to every other device.
Hybrid Topology: Combination of two or more topologies.
Considerations
Cost of management.
Cable length.
Future network growth.
PROTOCOLS AND STANDARDS
Protocol: Predetermined rules for data communication.
Standard: Documented agreements on technical specifications, establishing how products or services are designed.
Important Standard Organizations
IEEE: Promotes electrical technology.
ANSI: Known for standardization in technologies.
ISO: Defines OSI Reference Model.
IETF: Develops and standardizes internet technologies.
NETWORK CLASSIFICATIONS AND ARCHITECTURE
Types
Personal Area Network (PAN): Small, individual networks (e.g., USB connections).
Local Area Network (LAN): Connects devices over small geographic areas such as buildings.
Wide Area Network (WAN): Covers larger distances, e.g., corporate networks spanning countries.
Virtual Private Network (VPN): Provides secure remote access over the internet.
Storage Area Network (SAN): Connects storage devices.
Structure
Client/Server Architecture: Separates client and server tasks.
Peer-to-Peer Architecture: All devices share resources equally.
CONCLUSION
Understanding networks and their security is essential in today's digital environment for efficient and secure communication.
Data Privacy
Personal data refers to any information, whether recorded in a material form or not, from which the identity of an individual is apparent or can be directly ascertained by the entity holding the information.
Privacy concerns the collection and use of data about individuals. There are three (3) primary privacy issues:
Accuracy: Relates to the responsibility of those who collect data to ensure that the data is correct.
Property: Relates to who owns the data.
Access: Relates to the responsibility of those who have data to control who can use that data.
Data security includes a set of standards and different safeguards and measures that an organization is taking to prevent any third party from unauthorized access to digital data or any intentional or unintentional alteration, deletion, or data disclosure. It focuses on the protection of data from malicious attacks and prevents the exploitation of stolen data such as:
Data breach: An unauthorized or unintentional disclosure of confidential information.
Cyberattack: The stealing of data or confidential information by electronic means, including ransomware and hacking.
CIA Triad is a model designed to guide an organization’s policies on information security. The elements of the triad are considered the three most crucial components of security. The following are the three (3) elements of data security.
Confidentiality ensures that data is accessed only by authorized individuals.
Integrity ensures that information is reliable as well as accurate.
Availability ensures that data is both available and accessible when needed.
Elements of Data Privacy
Data privacy encompasses three (3) key elements:
Right of an individual to be left alone and have control over their data.
Procedures for proper handling, processing, collecting, and sharing of personal data.
Compliance with data protection laws.
Data Management
Data management refers to the process of ingesting, storing, organizing, and maintaining the data created and collected by an organization.
Data management is at the heart of privacy. Data is a vague concept and can encompass such a wide range of information.
Aspect of Privacy
Information privacy is considered an important aspect of information sharing. With the advancement of the digital age, personal information vulnerabilities have increased.
Information privacy may be applied in numerous ways, including encryption, authentication, and data masking, each attempting to ensure that information is available only to those with authorized access.
Information privacy includes the regulations required for companies to protect data. As more data protection regulation grows worldwide, global privacy requirements and demands will also expand and change.
Protective measures are geared toward preventing data mining and the unauthorized use of personal information, which are illegal in many parts of the world.
Information privacy also relates to different data types, including:
Internet privacy: All personal data shared over the Internet is subject to privacy issues. Most websites publish a privacy policy that details the website's intended use of collected online and/or offline collected data.
Financial privacy: Financial information is particularly sensitive, as it may easily be used to commit online and/or offline fraud.
Medical privacy: All medical records are subject to stringent laws that address user access privileges. By law, security and authentication systems are often required for individuals that process and store medical records.