Types of Networks

Network Devices

The OSI Model

The OSI model divides network communication into 7 distinct layers. As data moves down the stack, each layer adds a header — this is encapsulation. As data moves back up at the receiving end, each layer removes its header — this is de-encapsulation.

#
Layer
Responsibility
Examples
Mnemonic
7
Application
Interface for users and apps
HTTP, FTP, SMTP, DNS
All
6
Presentation
Data formatting, encryption
JPEG, SSL/TLS
People
5
Session
Managing sessions
NetBIOS, RPC
Seem
4
Transport
End-to-end communication
TCP, UDP
To
3
Network
Routing packets
IP, ICMP
Need
2
Data Link
Framing, MAC addressing
Ethernet, Wi-Fi
Data
1
Physical
Raw bit transmission
Cables, switches
Processing

Mnemonic (top to bottom): All People Seem To Need Data Processing

The TCP/IP Model

TCP/IP uses four layers. TCP is connection-oriented, provides error checking and guaranteed delivery. UDP is connectionless, faster but no delivery guarantee — used when speed matters more than reliability (streaming, DNS, VoIP).

IPv4 vs IPv6

Wireless (Wi-Fi) Security

Unlike wired networks, wireless signals can be intercepted at a distance. Key requirement: use WPA2 or WPA3 for encryption of wireless traffic. Earlier standards (WEP, WPA) have known vulnerabilities and should not be used.

Network Threats and Attack Types

Ports and Protocols — Insecure vs Secure

If a protocol transmits data in cleartext, it is susceptible to network sniffing. The secure alternative typically adds TLS/SSL encryption.

Port
Protocol
Secure Alt
Notes
21
FTP
22 – SFTP
Credentials in plaintext
23
Telnet
22 – SSH
All data in plaintext
25
SMTP
587 – SMTP/TLS
Unencrypted email
53
DNS
853 – DoT
Queries can be intercepted
80
HTTP
443 – HTTPS
Unencrypted web traffic
143
IMAP
993 – IMAPS
Unencrypted email retrieval
161/162
SNMP v1/v2
SNMPv3
Weak authentication
389
LDAP
636 – LDAPS
Directory lookups in plaintext

Identifying and Preventing Threats

On-Premises Data Centers

Cloud Computing

Cloud service models differ by the level of control the consumer has:

Cloud deployment models:

An SLA (Service Level Agreement) is the contractual agreement defining minimum service levels, availability guarantees, security standards, data ownership, and remedies for failures.

Secure Network Design

Key Terms for the Exam

Term
Definition
OSI Model
7-layer framework for network communication
Encapsulation
Adding headers as data moves down the OSI stack
TCP
Connection-oriented, reliable transport protocol
UDP
Connectionless, faster but unreliable transport protocol
IPv6
128-bit addressing with mandatory IPsec
DoS/DDoS
Attack overwhelming a system with traffic
Spoofing
Faking a source address to disguise identity
MITM
Attacker intercepts communication between two parties
IDS
Monitors and alerts on suspicious activity (passive)
IPS
Monitors and blocks threats inline (active)
SIEM
Centralised log collection and correlation platform
SaaS/PaaS/IaaS
Cloud service models by level of consumer control
DMZ
Network zone accessible from internet, isolated from internal network
VLAN
Logical network segment created by switches
Zero Trust
Never trust, always verify — security at the asset level
NAC
Enforces security policy compliance at point of network connection