SCT Unit-1
SCT Unit-1
Chapter – 1
Network basics:
Network basics involve understanding the fundamental concepts that make up computer
networks, including how devices communicate, the types of networks, and the protocols that
govern data exchange. Here's an overview:
1. What is a Network?
A network is a collection of interconnected devices (such as computers, printers, servers, and
other hardware) that communicate with each other to share resources and information.
2. Types of Networks
Local Area Network (LAN): A network that connects devices within a small geographic area,
such as a home, office, or building.
Wide Area Network (WAN): A network that covers a large geographic area, often connecting
multiple LANs. The internet is the largest example of a WAN.
Metropolitan Area Network (MAN): A network that spans a city or large campus, connecting
multiple LANs within that area.
Personal Area Network (PAN): A small network for personal devices, like connecting a
smartphone to a laptop via Bluetooth.
Wireless Local Area Network (WLAN): A LAN that uses wireless communication methods,
like Wi-Fi, to connect devices.
3. Network Components
Router: Directs data between different networks and connects to the internet.
Switch: Connects devices within the same network, managing data traffic efficiently.
Modem: Converts digital data to analog signals and vice versa, enabling internet access over
communication lines.
Firewall: Protects a network by controlling incoming and outgoing traffic based on security
rules.
Access Point: Allows wireless devices to connect to a wired network, extending the wireless
range.
4. Network Protocols
Protocols are sets of rules that govern how data is transmitted over a network. Some key
protocols include:
TCP/IP (Transmission Control Protocol/Internet Protocol): The foundational protocol for the
internet, ensuring data is sent and received correctly.
HTTP/HTTPS (Hypertext Transfer Protocol/Secure): Used for transmitting web pages.
FTP (File Transfer Protocol): Used for transferring files between devices on a network.
SMTP (Simple Mail Transfer Protocol): Used for sending emails.
DNS (Domain Name System): Translates domain names into IP addresses, allowing users to
access websites.
5. IP Addressing
An IP (Internet Protocol) address is a unique identifier assigned to each device on a network,
allowing it to communicate with other devices. There are two types of IP addresses:
IPv4: The most common form, using a 32-bit address format (e.g., 192.168.1.1).
IPv6: A newer format designed to replace IPv4, using a 128-bit address format to allow for
more devices (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
6. Network Topologies
The layout or structure of a network, known as its topology, determines how devices are
interconnected. Common topologies include:
Star: All devices are connected to a central hub or switch.
Bus: All devices share a single communication line.
Ring: Devices are connected in a circular pattern.
Mesh: Devices are interconnected, with each device connecting to multiple other devices.
7. Network Security
Securing a network is crucial to protect data and prevent unauthorized access. Key aspects
include:
Encryption: Scrambling data so only authorized parties can read it.
Authentication: Verifying the identity of users or devices before granting access.
Access Control: Restricting who can access certain parts of the network.
Monitoring: Continuously observing the network for suspicious activity.
8. Data Transmission
Data is transmitted over networks in the form of packets, which are small chunks of data.
Protocols like TCP/IP ensure that these packets are correctly assembled and delivered to the
right destination.
Network components:
Network components are the fundamental elements that make up a computer network. Here
are some key components:
1. Network Interface Cards (NICs): Hardware that allows computers to connect to a
network.
2. Switches: Devices that connect multiple devices within a local area network (LAN) and
use MAC addresses to forward data to the correct destination.
3. Routers: Devices that connect different networks together and route data between them
using IP addresses.
4. Cables: Physical medium for connecting network devices, such as Ethernet cables.
5. Modems: Devices that modulate and demodulate signals for internet connectivity over
telephone lines or cable systems.
6. Access Points (APs): Devices that allow wireless devices to connect to a wired network
using Wi-Fi.
7. Firewalls: Security devices that monitor and control incoming and outgoing network
traffic based on predetermined security rules.
8. Servers: Computers that provide data, services, or programs to other computers, known as
clients, over a network.
9. Clients: Devices such as computers, smartphones, or tablets that access resources provided
by servers.
10. Hubs: Basic devices that connect multiple network devices, broadcasting data to all
devices within the network.
11. Repeaters: Devices that regenerate and amplify signals to extend the distance over which
data can travel in a network.
These components work together to enable communication, data transfer, and resource
sharing across a network.
Network types:
Network types are categorized based on their size, scope, and purpose. Here are some
common types:
1. Local Area Network (LAN): A network that covers a small geographic area, such as a
single building or campus. It is used to connect computers and devices within a limited area.
2. Wide Area Network (WAN): A network that covers a large geographic area, often
composed of multiple LANs connected together. The internet is the largest example of a
WAN.
3. Metropolitan Area Network (MAN): A network that spans a city or a large campus. It is
larger than a LAN but smaller than a WAN.
4. Personal Area Network (PAN): A network used for communication among devices close
to one person, such as within a range of a few meters. Bluetooth is a common PAN
technology.
5. Campus Area Network (CAN): A network that connects multiple LANs within a limited
geographic area, such as a university campus or corporate office complex.
6. Virtual Private Network (VPN): A secure network connection over a public network
such as the internet. VPNs are used to provide secure remote access to an organization's
internal network.
7. Storage Area Network (SAN): A network designed to provide access to consolidated,
block-level data storage. SANs are used to enhance storage devices, such as disk arrays and
tape libraries, accessible to servers.
8. Home Area Network (HAN): A network within a user's home that connects digital
devices, typically including computers, printers, smartphones, and smart appliances.
9. Enterprise Private Network (EPN): A network built by an enterprise to connect its
various locations, often including multiple LANs and MANs.
10. Wireless Local Area Network (WLAN): A LAN that uses wireless technology (Wi-Fi)
to connect devices within a limited area. WLANs are commonly found in homes, schools,
and offices.
Each network type serves specific needs and requirements, providing the appropriate scale
and scope of connectivity for different environments and use cases.
Network models:
Network models are frameworks that describe how data is transmitted and received across
networks. The two primary network models are the OSI (Open Systems Interconnection)
model and the TCP/IP (Transmission Control Protocol/Internet Protocol) model. Here's an
introduction to both:
OSI Model
The OSI model is a conceptual framework used to understand and implement network
communications by dividing the process into seven distinct layers. Each layer has specific
functions and protocols associated with it:
1. Physical Layer:
Function: Handles the physical connection between devices, including cables, switches, and
network interface cards.
Protocols/Standards: Ethernet, USB, Bluetooth.
2. Data Link Layer:
Function: Ensures error-free data transfer between two adjacent nodes, handles MAC
addresses.
Protocols/Standards: Ethernet, PPP (Point-to-Point Protocol), MAC (Media Access
Control).
3. Network Layer:
Function: Manages data routing, forwarding, and addressing, handles IP addresses.
Protocols/Standards: IP (Internet Protocol), ICMP (Internet Control Message Protocol),
ARP (Address Resolution Protocol).
4. Transport Layer:
Function: Provides reliable data transfer and error recovery, manages end-to-end
communication.
Protocols/Standards: TCP (Transmission Control Protocol), UDP (User Datagram
Protocol).
5. Session Layer:
Function: Manages sessions or connections between applications.
Protocols/Standards: NetBIOS, RPC (Remote Procedure Call).
6. Presentation Layer:
Function: Translates data between the application layer and the network, handles data
encryption and compression.
Protocols/Standards: SSL (Secure Sockets Layer), TLS (Transport Layer Security).
7. Application Layer:
Function: Provides network services to end-user applications, handles high-level APIs.
Protocols/Standards: HTTP (Hypertext Transfer Protocol), FTP (File Transfer Protocol),
SMTP (Simple Mail Transfer Protocol), DNS (Domain Name System).
TCP/IP Model
The TCP/IP model is a more practical and simplified framework compared to the OSI model,
consisting of four layers. It is the foundation of the internet and modern networking.
1. Network Interface Layer:
Function: Corresponds to the OSI's physical and data link layers, handles physical
transmission of data.
Protocols/Standards: Ethernet, Wi-Fi.
2. Internet Layer:
Function: Corresponds to the OSI's network layer, manages packet routing and addressing.
Protocols/Standards: IP (Internet Protocol), ICMP (Internet Control Message Protocol).
3. Transport Layer:
Function: Corresponds to the OSI's transport layer, provides end-to-end communication and
data transfer reliability.
Protocols/Standards: TCP (Transmission Control Protocol), UDP (User Datagram
Protocol).
4. Application Layer:
Function: Corresponds to the OSI's session, presentation, and application layers, provides
network services to applications.
Protocols/Standards: HTTP, FTP, SMTP, DNS.
Comparison
Layering: The OSI model has seven layers, while the TCP/IP model has four layers.
Usage: The OSI model is more theoretical and is used for understanding and teaching
network concepts. The TCP/IP model is more practical and is used for real-world networking,
especially in internet communications.
Functionality: Both models provide a layered approach to networking, ensuring modularity
and interoperability between different hardware and software.
Understanding these models helps in diagnosing network issues, designing network
architecture, and implementing network protocols effectively.
Both the OSI model and the TCP/IP model are still in use today, but they serve different
purposes in modern networking:
OSI Model
Usage: The OSI model is primarily used as a theoretical framework for understanding and
teaching network communications. It is a standard reference model that helps in
conceptualizing how different network protocols interact and operate at various layers. While
not directly implemented in practical networking, it provides a useful guide for developing
new protocols and troubleshooting network issues.
TCP/IP Model
Usage: The TCP/IP model is the foundation of the internet and most modern networks. It is
actively used in the real world for network communications and is the basis for the protocols
that govern data transmission over the internet and within many enterprise networks.
Practical Network Usage
Network Interface Layer: Technologies like Ethernet and Wi-Fi are in widespread use,
forming the basis of local area networks (LANs) and wireless networks.
Internet Layer: The IP protocol is universally used for addressing and routing packets across
the internet and various private networks. IPv4 is still widely used, but IPv6 is becoming
more prevalent due to the exhaustion of IPv4 addresses.
Transport Layer: TCP and UDP are essential for data transmission. TCP provides reliable,
ordered, and error-checked delivery of data, making it suitable for applications where
reliability is critical, such as web browsing and email. UDP is used for applications where
speed is more critical than reliability, such as video streaming and online gaming.
Application Layer: Protocols like HTTP/HTTPS (for web browsing), FTP (for file transfers),
SMTP (for email), and DNS (for domain name resolution) are in constant use.
Threat Actors
1. Hacker:
Definition: An individual who uses technical knowledge to gain unauthorized access to
systems or data.
2. Insider Threat:
Definition: A security risk that comes from within the organization being attacked, often
involving employees or contractors.
3. Script Kiddie:
Definition: An inexperienced individual who uses existing computer scripts or code to hack
into computers, lacking the expertise to write their own code.
4. Advanced Persistent Threat (APT):
Definition: A prolonged and targeted cyberattack in which an intruder gains access to a
network and remains undetected for an extended period.
Understanding these terms is essential for comprehending the complexities of cybersecurity
and implementing effective protective measures.
Recent Cyber-attacks:
Here are some recent cyber-attacks in 2024:
1. French State DDoS Attack (March 2024): This attack targeted several French state
services, disrupting over 300 web domains and 177,000 IP addresses. The group
"Anonymous Sudan" claimed responsibility, although there are suspicions of a Russian
connection.
2. Change Healthcare Ransomware Attack (February 2024): This massive attack
impacted healthcare payment processing across the US. The Russia-based ALPHV/BlackCat
group claimed responsibility, causing significant financial loss and operational disruptions.
3. UK Ministry of Defence Payroll Hack (May 2024): The payroll system of the UK armed
forces was hacked, exposing personal data of nearly 270,000 staff. The attack is suspected to
be linked to China.
4. NHS Scotland Ransomware Attack (March 2024): The Inc Ransomware Group attacked
NHS Dumfries and Galloway, leaking sensitive patient and staff data including children's
mental health information.
5. MOAB Attack (January 2024): This attack affected 3,876 organizations, showcasing the
rising trend of large-scale cyber-attacks with significant impact.
These incidents highlight the evolving threat landscape, with increasing occurrences of
ransomware, DDoS attacks, and breaches of sensitive data, emphasizing the need for robust
cybersecurity measures.
Famous Cyber-attacks and Their Explanations:
1. Stuxnet (2010):
Overview: Stuxnet is a sophisticated computer worm that specifically targeted the
centrifuges at Iran's Natanz nuclear facility. It is widely believed to be a joint effort by the
United States and Israel.
Impact: Stuxnet is notable for being the first known cyber weapon designed to cause
physical damage. It disrupted Iran's nuclear program by causing the centrifuges to spin out of
control and eventually break down.
Significance: This attack demonstrated the potential for cyber weapons to cause real-world
physical damage and highlighted vulnerabilities in critical infrastructure.
2. Sony Pictures Hack (2014):
Overview: The Sony Pictures Entertainment hack was attributed to a group calling itself the
Guardians of Peace, which the FBI later linked to North Korea. The attack involved the theft
of massive amounts of data, including unreleased films, employee information, and
confidential emails.
Impact: The attackers leaked sensitive information and demanded that Sony cancel the
release of "The Interview," a comedy film about a plot to assassinate the North Korean leader.
Significance: This attack raised awareness about the importance of cybersecurity in
protecting intellectual property and the potential for cyberattacks to be used as tools of
political coercion.
3. WannaCry Ransomware (2017):
Overview: WannaCry was a global ransomware attack that affected over 230,000
computers in more than 150 countries. The ransomware encrypted users' data and demanded
a Bitcoin ransom for decryption.
Impact: Critical services, including the UK's National Health Service (NHS), were
disrupted, leading to canceled medical procedures and emergency responses.
Significance: WannaCry highlighted the dangers of ransomware and the importance of
regular software updates, as it exploited a vulnerability in Microsoft Windows for which a
patch had been released but not widely applied.
4. Equifax Data Breach (2017):
Overview: Equifax, one of the largest credit reporting agencies, suffered a data breach that
exposed the personal information of 147 million people, including Social Security numbers,
birth dates, and addresses.
Impact: The breach had severe repercussions for consumers, leading to widespread identity
theft and fraud concerns.
Significance: This incident underscored the critical need for robust data protection
measures and prompted regulatory changes and increased scrutiny of data security practices
in the financial sector.
5. SolarWinds Attack (2020):
Overview: The SolarWinds attack involved the insertion of malware into the Orion
software platform used by thousands of organizations worldwide, including multiple U.S.
government agencies. The attack is attributed to Russian state-sponsored hackers.
Impact: The attackers gained access to sensitive information and systems, leading to
concerns about national security and the integrity of critical infrastructure.
Significance: This breach highlighted the vulnerabilities in supply chain security and the
importance of securing third-party software.
6. Colonial Pipeline Ransomware Attack (2021):
Overview: The Colonial Pipeline, a major fuel pipeline in the U.S., was hit by a
ransomware attack that forced the company to shut down its operations. The DarkSide
ransomware group was responsible.
Impact: The shutdown led to fuel shortages and panic buying across the southeastern
United States.
Significance: This attack emphasized the critical nature of infrastructure security and the
significant impact cyberattacks can have on everyday life and national security.
Categories of Cyber-attacks:
Cyber-attacks can be categorized based on their objectives, methods, and targets.
Understanding these categories helps in identifying potential threats and implementing
appropriate defense mechanisms. Here are some common categories of cyber-attacks:
1. Malware Attacks
Malware (short for "malicious software") refers to any software intentionally designed to
cause damage to a computer, server, client, or network.
Viruses: Malicious programs that attach themselves to legitimate files and spread to other
files and systems.
Worms: Standalone malware that replicates itself to spread to other computers without
human intervention.
Trojan Horses: Malicious programs disguised as legitimate software to trick users into
installing them.
Ransomware: Malware that encrypts a victim's data and demands payment (ransom) for
the decryption key.
Spyware: Software that secretly monitors user activity and gathers information without
their consent.
Adware: Malware that automatically displays or downloads advertising material when a
user is online.
2. Phishing Attacks
Phishing is a type of social engineering attack where attackers deceive individuals into
providing sensitive information (such as passwords, credit card numbers) by pretending to be
a trustworthy entity.
Email Phishing: Attackers send fraudulent emails that appear to be from reputable sources.
Spear Phishing: Targeted phishing attacks aimed at a specific individual or organization.
Whaling: Phishing attacks aimed at high-profile individuals such as executives or
celebrities.
Vishing (Voice Phishing): Phishing attacks conducted over the phone.
Smishing (SMS Phishing): Phishing attacks conducted via SMS (text messages).
3. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
DoS Attacks: Attackers flood a target system with excessive requests, overwhelming it and
rendering it unable to function properly.
DDoS Attacks: Similar to DoS attacks, but launched from multiple compromised systems
(botnets), making it more difficult to stop.
4. Man-in-the-Middle (MitM) Attacks
In MitM attacks, attackers secretly intercept and relay communications between two parties
who believe they are directly communicating with each other.
Session Hijacking: Attackers steal a session token to impersonate the user and gain
unauthorized access.
Eavesdropping: Attackers listen to or intercept communications without the consent of the
communicating parties.
5. SQL Injection Attacks
In SQL injection attacks, attackers exploit vulnerabilities in web applications to inject
malicious SQL statements, allowing them to manipulate the backend database.
Classic SQL Injection: Attackers insert or "inject" malicious code into a query.
Blind SQL Injection: Attackers infer database information by asking true or false
questions to the database.
6. Zero-Day Exploits
Zero-day exploits are attacks that target previously unknown vulnerabilities in software,
hardware, or firmware, giving developers "zero days" to fix the issue before it's exploited.
7. Advanced Persistent Threats (APTs)
APTs involve a prolonged and targeted cyber attack in which an intruder gains access to a
network and remains undetected for an extended period, often to steal sensitive data.
Phases of APTs: Initial intrusion, expansion of access, data exfiltration, and maintaining
persistence.
8. Insider Threats
Insider threats involve attacks from within the organization, where current or former
employees, contractors, or business partners misuse their access to compromise the security
of the organization.
Intentional Insider Threats: Malicious activities performed by insiders with the intent to
harm the organization.
Unintentional Insider Threats: Security breaches caused by careless or negligent insiders.
9. Social Engineering Attacks
Social engineering involves manipulating individuals into divulging confidential
information or performing actions that compromise security.
Pretexting: Attackers create a fabricated scenario (pretext) to trick the victim into
providing information.
Baiting: Attackers offer something enticing to lure victims into a trap, such as a free
download that installs malware.
Tailgating: Gaining unauthorized access to a physical location by following someone with
authorized access.
10. Credential-based Attacks
Credential-based attacks involve stealing or guessing user credentials (usernames,
passwords) to gain unauthorized access to systems.
Brute Force Attack: Attackers try every possible combination of passwords until they find
the correct one.
Credential Stuffing: Attackers use lists of stolen usernames and passwords to gain access
to multiple accounts.
11. Ransomware Attacks
Ransomware is a type of malware that encrypts the victim's data and demands a ransom for
the decryption key. It can spread through phishing emails, malicious downloads, or
vulnerabilities in software.
12. Cross-Site Scripting (XSS) Attacks
In XSS attacks, attackers inject malicious scripts into webpages viewed by other users.
These scripts can be used to steal cookies, session tokens, or other sensitive information.