Core Network Security Concepts and Fundamentals
Network security protects data traveling across internal and external communications. Understanding how security controls map to network layers is fundamental to this domain.
The OSI Model and Security Controls
The OSI model's seven layers provide a framework for understanding where security controls apply. Physical security operates at Layer 1, encryption at Layers 3-4, and application-level security at Layer 7. Each layer requires different protective mechanisms based on the data flowing through it.
Core Network Technologies
TCP/IP protocols like TCP, UDP, and ICMP operate at the transport and network layers with distinct security implications:
- TCP offers reliability through handshakes, ideal for applications requiring complete data delivery
- UDP prioritizes speed for real-time applications like video conferencing
- ICMP enables network diagnostics but can be exploited for reconnaissance
Network Defense Strategies
Network segmentation divides systems into security zones, preventing lateral movement if one segment is compromised. Firewalls enforce security policies by filtering traffic based on rules, creating boundaries between trusted internal networks and untrusted external networks.
Network Access Control (NAC) systems authenticate devices before allowing network access, ensuring only compliant devices connect to resources. Zero-trust architecture assumes all traffic is potentially malicious regardless of source, requiring verification at every step. These foundational concepts underpin every security decision in network design, from choosing protocols to implementing access controls.
Cryptographic Systems and Encryption Protocols
Cryptography protects confidentiality, integrity, and authenticity of communications through mathematical algorithms. Mastering the differences between encryption types is essential for exam success and real-world implementation.
Symmetric vs. Asymmetric Encryption
Symmetric encryption uses a single shared key for both encryption and decryption, offering speed and efficiency but requiring secure key distribution. AES (Advanced Encryption Standard) is the current government standard, operating on 128-bit data blocks with key lengths of 128, 192, or 256 bits.
Asymmetric encryption uses a public-key and private-key pair, enabling secure key exchange without prior secure channels. RSA, elliptic curve cryptography (ECC), and Diffie-Hellman are primary asymmetric algorithms. Hybrid encryption combines both methods: asymmetric encryption secures the symmetric key exchange, then symmetric encryption protects bulk data.
Hashing and Digital Signatures
Hash functions create fixed-length fingerprints of data, enabling integrity verification without encryption. SHA-256 and SHA-3 are cryptographically secure standards. Digital signatures use private keys to sign data and public keys to verify authenticity and non-repudiation.
TLS and IPsec Protocols
TLS (Transport Layer Security) combines these mechanisms to secure internet communications, establishing encrypted channels through a handshake process. IPsec operates at the network layer, securing IP packets through encryption and authentication. Understanding when to apply each cryptographic mechanism ensures you design secure systems protecting data confidentiality while maintaining performance.
Secure Communication Protocols and VPN Technologies
Secure communication protocols establish protected channels for data transmission across networks. Your exam will test your ability to recognize protocols and recommend appropriate solutions for different scenarios.
Web and Remote Access Protocols
TLS/SSL encrypts web traffic on port 443, enabling HTTPS for secure websites. SSL has vulnerabilities and is deprecated. TLS versions 1.2 and 1.3 are current standards.
SSH (Secure Shell) provides encrypted command-line access to remote systems, replacing insecure Telnet and rlogin. SSH uses public-key authentication and supports both password and certificate-based methods.
DNS and Email Security
DNSSEC protects DNS queries from spoofing and cache poisoning through digital signatures on DNS records. Secure email relies on protocols like S/MIME and PGP for encryption and signing.
VPN Implementation Modes
VPNs (Virtual Private Networks) create encrypted tunnels through untrusted networks, making remote access and site-to-site connectivity secure. Two main approaches exist:
- IPsec VPNs operate at the network layer, supporting tunnel mode (entire IP packets encrypted) and transport mode (payload encryption only)
- SSL/TLS VPNs operate at the application layer, preferred for remote access requiring web browser access
Site-to-site VPNs connect entire networks, enabling secure communication between geographically distributed offices. Client-to-site VPNs connect individual users to corporate networks. MPLS (Multiprotocol Label Switching) enables traffic engineering and can provide pseudo-wire security for private network connections. Protocol selection ensures organizations deploy appropriate security while maintaining network performance.
Network Monitoring, Intrusion Detection, and Access Controls
Monitoring and detection systems identify security threats and policy violations in real-time. A strong understanding of these technologies reveals how they work together in layered defense.
Intrusion Detection and Prevention
IDS (Intrusion Detection Systems) analyze network traffic and host logs for suspicious patterns. They use signature-based detection for known attacks and anomaly-based detection for unknown threats.
- Network-based IDS monitors traffic between systems
- Host-based IDS analyzes individual system activity
- IPS (Intrusion Prevention Systems) extend IDS capabilities by actively blocking detected threats
Firewall Technologies
Firewalls enforce access control policies using stateless filtering (examining individual packets) or stateful inspection (tracking connection states). Next-generation firewalls add application awareness, enabling controls based on application types rather than just ports and protocols.
Access Control Lists (ACLs) define granular rules specifying allowed and denied traffic. Network Access Control validates device compliance before granting network access, checking antivirus status, patches, and configurations.
Visibility and Analytics
Unified Threat Management (UTM) appliances combine firewall, IDS/IPS, antivirus, and content filtering in single devices. SIEM (Security Information and Event Management) systems aggregate logs from network devices, servers, and applications, enabling correlation analysis and threat detection.
NetFlow and sFlow provide network traffic visibility, showing volume, protocols, and endpoints without inspecting packet contents. Anomaly detection identifies unusual patterns requiring investigation. These mechanisms work together to enforce security policies, detect intrusions quickly, and provide visibility necessary for effective incident response.
Wireless and Remote Access Security
Wireless networks present unique security challenges due to their broadcast nature and mobility requirements. Your exam will test knowledge of wireless standards, authentication methods, and remote access controls.
WiFi Security Evolution
WiFi security evolved through several generations:
- WEP (deprecated, easily cracked)
- WPA introduced stronger encryption
- WPA2 uses AES encryption with robust key derivation, becoming the standard for enterprise wireless
- WPA3 adds simultaneous authentication of equals (SAE) replacing pre-shared key authentication, protecting against dictionary attacks
Enterprise wireless deployments use 802.1X with RADIUS servers for certificate-based authentication, eliminating shared passwords. Wireless access points require secure placement, strong encryption, disabled default credentials, and regular firmware updates.
Wireless Threats and Detection
Rogue access points masquerade as legitimate networks, capturing credentials and traffic. Wireless intrusion detection detects rogue APs and unauthorized clients. Site surveys optimize coverage while minimizing RF spillage beyond building perimeters. Bluetooth v5.0 offers improved encryption and authentication for proximity-based applications.
Mobile and Remote Access Controls
Mobile device management controls corporate smartphones and tablets through policies enforcing encryption, authentication, and app restrictions. Remote access security includes VPN requirements, multi-factor authentication, and endpoint security verification.
Jump boxes and bastion hosts serve as secure intermediaries for administrative access. Geofencing restricts access based on location. Split tunneling policies determine whether non-corporate traffic uses the VPN or direct internet connection. Zero-trust network access requires continuous verification regardless of location or device. These controls ensure organizational data remains protected across offices, remote locations, and mobile devices.
