Core Network Security Concepts and Protocols
Network security operates on multiple layers to protect data transmission and system access. Each layer requires different security controls and protocols.
Understanding the OSI Model and Security
Security applies differently across the OSI model. Layer 3 (Network) focuses on IP-based security, Layer 4 (Transport) handles TCP/UDP security, and upper layers deal with application-level threats. Mastering these distinctions helps you understand where threats occur and how to defend them.
Essential Network Security Protocols
You must master these key protocols:
- TLS/SSL for encrypted web communications
- IPsec for secure IP transmission
- SSH for secure remote access (replaces Telnet)
- DNSSEC for protecting domain resolution
Each protocol targets different attack vectors and has specific security implications.
Firewall Types and Operation
Stateless firewalls filter based on header information only, making quick decisions without remembering previous packets. Stateful firewalls track connection states and make decisions based on packet context, providing stronger protection. Next-generation firewalls add application awareness, intrusion prevention, and deep packet inspection.
Well-Known Ports to Memorize
Port numbers are essential for Security+ exam success:
- HTTP: 80
- HTTPS: 443
- SSH: 22
- Telnet: 23
- DNS: 53
- SMTP: 25
- RDP: 3389
Flashcard drilling builds the vocabulary and conceptual framework needed for advanced network security topics.
Intrusion Detection and Prevention Systems
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are critical controls that monitor and respond to suspicious activity. Understanding the differences between them is fundamental for Security+ exam success.
IDS vs IPS: Key Differences
IDS operates in passive detection mode. It analyzes network traffic and alerts administrators when it detects potential attacks or policy violations, but does not actively block traffic. IPS works similarly but actively blocks detected threats by dropping packets or resetting connections, providing immediate automated protection.
Detection Modes: Network and Host-Based
Both systems operate in two deployment modes:
- Network-based (NIDS/NIPS) monitors traffic across network segments
- Host-based (HIDS/HIPS) protects individual systems
Each mode has different advantages for detecting threats at specific network levels.
Detection Methods: Signature vs Anomaly
Signature-based detection identifies known attacks by comparing traffic patterns against a database of known malicious signatures. This approach works well for known threats but misses new attacks. Anomaly-based detection identifies deviations from baseline normal behavior, potentially catching zero-day attacks that have no known signature.
Understanding Detection Accuracy
You must know four detection outcomes:
- True positives: Correctly identified attacks
- False positives: Innocent traffic flagged as attack
- True negatives: Correctly identified legitimate traffic
- False negatives: Missed attacks
False positives cause alert fatigue. False negatives represent security incidents you never catch. Tuning IDS/IPS systems requires balancing detection sensitivity with operational overhead.
Flashcard learning of popular platforms like Snort and Suricata strengthens your practical understanding for exam success.
Virtual Private Networks and Secure Remote Access
Virtual Private Networks (VPNs) create encrypted tunnels for secure data transmission over untrusted networks like the internet. They enable remote workers and branch offices to connect securely to corporate resources.
VPN Types: Site-to-Site vs Remote Access
Site-to-site VPNs connect entire networks, typically connecting remote office branches to headquarters. Remote access VPNs serve individual users connecting from external locations. Each type serves different business needs and uses different configurations.
IPsec Protocol Suite
IPsec provides encryption, authentication, and data integrity for IP communications. It operates at the network layer and protects all traffic between endpoints transparently. IPsec uses two main modes:
- Tunnel mode: Entire packet encrypted, used for site-to-site connections
- Transport mode: Payload encrypted, used for host-to-host communications
SSL/TLS VPNs and Application Layer Security
SSL/TLS VPNs operate at the application layer using HTTPS. They offer user-friendly access through web browsers without requiring specialized client software installation. This makes them popular for remote workers with diverse devices.
Advanced VPN Security Concepts
Key exchange protocols like IKEv2 establish secure VPN connections with mutual authentication before data transmission begins. Perfect Forward Secrecy (PFS) ensures that even if long-term keys are compromised, previously encrypted sessions remain secure because session keys are not derived from long-term keys alone.
Split tunneling presents an important security consideration. When enabled, some traffic bypasses the VPN and travels directly to the internet, potentially exposing sensitive data to local network threats. Understanding when to disable split tunneling is critical for secure remote access.
Flashcards help you memorize VPN protocols, encryption algorithms, authentication methods, and practical security implications.
Network Segmentation and Access Control
Network segmentation divides networks into smaller isolated segments to contain security breaches and enforce access control policies. This limits attacker movement if one segment is compromised.
VLANs for Logical Segmentation
VLANs (Virtual Local Area Networks) create logical network segments on physical infrastructure, separating user groups and limiting broadcast traffic. By isolating different user types, departments, or security levels, VLANs prevent unauthorized lateral movement.
DMZs and Screened Subnets
Demilitarized Zones (DMZs) are network segments positioned between internal networks and the internet. They host public-facing services like web servers while protecting internal systems from direct internet exposure. Screened subnets similarly isolate critical systems while controlling traffic flow through firewalls.
Modern Approaches: Zero Trust and Microsegmentation
Zero trust architecture represents a modern segmentation approach that assumes no trust by default. It requires continuous authentication and authorization for every access request, regardless of network location. Microsegmentation extends this concept by creating many small zones throughout the network, limiting attacker movement even within the network perimeter.
Access Control Principles and Tools
Default deny approach rejects all traffic unless explicitly permitted, proving more secure than default allow. Network Access Control (NAC) solutions verify device compliance with security policies before granting network access, ensuring only compliant devices connect to sensitive networks.
Access Control Lists (ACLs) filter traffic based on source/destination IP addresses, protocols, and ports. Understanding ACLs provides practical knowledge for implementing segmentation.
Flashcard study of segmentation concepts, VLAN numbering schemes, and NAC policies builds knowledge needed for Security+ questions about network design and threat containment.
Wireless Network Security and Emerging Threats
Wireless network security requires special attention because radio signals transmit data through open air, making networks inherently vulnerable to eavesdropping and unauthorized access.
Evolution of Wi-Fi Security Standards
Wi-Fi security has evolved significantly across generations:
- WEP (Wired Equivalent Privacy) is severely compromised and should never be used
- WPA (Wi-Fi Protected Access) provided improvements but has known vulnerabilities
- WPA2 added stronger encryption using AES and is currently industry standard
- WPA3 represents the latest standard with enhanced protection including Simultaneous Authentication of Equals (SAE) replacing pre-shared keys and Opportunistic Wireless Encryption (OWE) for open networks
Understanding the progression from older to newer standards is essential for Security+ exam questions.
Enterprise Wireless Authentication
Enterprise wireless deployments use RADIUS (Remote Authentication Dial-In User Service) servers to authenticate users with individual credentials rather than shared passwords. This approach significantly improves security compared to pre-shared key methods used in home networks.
Common Wireless Attacks
You must know these wireless threats:
- Rogue access points masquerade as legitimate networks to capture credentials
- Evil twin attacks create convincing duplicate networks
- Packet sniffing captures unencrypted wireless traffic
- Jamming attacks disrupt wireless signals
Device Management and IoT Security
Mobile device management (MDM) enforces security policies on smartphones and tablets connecting to networks, requiring encryption and remote wipe capabilities. BYOD (Bring Your Own Device) policies create management challenges. IoT (Internet of Things) devices connecting to networks often have poor security implementations, requiring separate segmentation and monitoring.
Flashcards help you distinguish between wireless standards, memorize their security characteristics, and recall wireless attacks and defenses.
