VU23213 Learner Resource v1.0
VU23213 Learner Resource v1.0
Learner Resource
Authors:
Frank Trcka, Teacher, Melbourne Polytechnic
Eleanor Ravenarki, Curriculum Developer, Melbourne Polytechnic
Disclaimer Statement:
PLEASE NOTE that by clicking on a link you may be directed to a third-party site.
You should respect the intellectual property on that site. You may be leaving the Melbourne Polytechnic website.
Melbourne Polytechnic does not endorse a linked site or guarantee the accuracy or currency of any information
contained on the third-party linked site.
Acknowledgements
National training packages are attributed as ‘© State of Victoria (Department
of Education and Training) 2018’. Training packages are copied and
communicated under Creative Commons Attribution-Non Derivative 3.0 Australia (CC BY-ND 3.0
AUS) license.
Images/illustrations
Getty Images contained in this resource are provided under a license agreement with Melbourne
Polytechnic. Any further reproduction or communication of these images is not permitted.
This unit describes the skills and knowledge required to comprehend how data travels around the
internet. It includes the function and operation of protocols such as Open System Interconnection
(OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) suite and devices that facilitate
data transfer. The exposure to these protocols is at an introductory level in this unit.
For further information, links are provided to relevant websites and videos. These are highlighted as
follows:
Weblink:
www.insert_weblink_here.com
Learning Activities are provided as an opportunity for you to apply the concepts and practise the
skills you learn in this unit.
Learning Activity:
Word Description
binary A number system that contains two symbols, 0 and 1. Also known as
base 2.
cyber security Measures used to protect the confidentiality, integrity and availability
of systems and data.
cyber security incident An unwanted or unexpected cyber security event, or a series of such
events, that have a significant probability of compromising business
operations.
cyber threat Any circumstance or event with the potential to harm systems or data.
data security Measures used to protect the confidentiality, integrity and availability
of data.
decimal Another name for the number system that contains the digits 0 to 9.
Also known as denary or base 10. Decimal fractions are numbers where
the fraction is indicated by the use of a full stop, eg 4.1 or 6.3.
device access control Software that can be used on a system to restrict access to
software communications ports. Device access control software can block all
access to a communications port or allow access based on device types,
manufacturer’s identification or even unique device identifiers.
hexadecimal A number system using 16 symbols from 0-9 and A-F, also known as
base 16 and hex.
ICT equipment Any device that can process, store or communicate data, such as
computers, multifunction devices, network devices, smartphones,
digital cameras, electronic storage media, smart devices and other
radio devices.
IP Internet Protocol
Local Area Network A collection of devices connected together in one physical location,
(LAN) such as a building, office, or home.
malicious code Any software that attempts to subvert the confidentiality, integrity or
availability of a system.
network The combination of two or more hosts and the connecting links
between them. A physical network is the hardware that makes up the
network. A logical network is the abstract organization overlaid on all or
part of one or more physical network
network access control Security policies used to control access to a network and actions on a
network. This can include authentication checks and authorisation
controls.
network device ICT equipment designed to facilitate the communication of data. For
example, routers, switches and wireless access points.
packet The block of control information and data for one transaction between
a host and its network.
Security plan Central document detailing how the entity plans to manage and
address their security risks.
© Commonwealth of Australia 2022.
Security risk Managing risks related to an entity's information, people and physical
management assets.
Standard Operating Instructions for following a defined set of activities in a specific manner.
Procedure For example, an approved data transfer process.
Virtual Local Area . Network devices and other ICT equipment grouped logically based on
Network (VLAN) resources, security or business requirements instead of their physical
location.
Wide Area Network A collection of local-area networks (LANs) or other networks that
(WAN) communicate with one another. A WAN is essentially a network of
networks, with the Internet the world's largest WAN.
wireless access point A device which enables communications between wireless clients. It is
typically also the device which connects wired and wireless networks.
Video Link: What is Cloud Security and Why Do You Need It?
https://www.youtube.com/watch?v=JyQ_NHwA0QI
ANSWER DESCRIPTION
Vectors
☐
Cyber attacks
☐
networks
☐
Breaches
☐
Moodle Note: multiple choice
What are the steps required to secure cloud data based on?
2 Select all the correct answers
ANSWER DESCRIPTION
Amount of data
☐
Number of authorised users
☐
Type
☐
Sensitivity
☐
Moodle Note: multiple choice
The Australian Cyber Security Centre has an information security manual that provides guidelines for
networking.
https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-networking
https://purplesec.us/common-network-vulnerabilities/
https://www.youtube.com/watch?v=2VaPTIuRs4k
Network security vulnerabilities are constantly evolving as threat actors seek new and intuitive ways
to gain access to a business’s network. In this video the most common types of network
vulnerabilities that threaten the security of network systems in 2022 are discussed.
1.2 Differences between network security and cyber security
Information
security
Cyber security
Network security
2. Data Protects the data flowing over Protects the data that is located in
the network devices, servers and in the realm
4. Viruses Deals with the protection from Deals with the protection from cyber-
DOS attacks, viruses, and attacks and cybercrimes
worms.
5. Strikes against Network Security strikes against Cyber Security strikes against cyber
trojans. threats and cyberattacks.
6. Security Secures the data traveling Deals with the protection of the data
across the network by resting.
terminals.
8. Job titles of Network Security Engineer and Cyber Security Architect and Cyber
people working Network Security Architect Security Analyst
in the sector
https://www.geeksforgeeks.org/difference-between-network-security-and-cyber-security/
The Australia the Protective Security Policy Framework (PSPF) helps Australian Government entities
to protect their people, information and assets, both at home and overseas. It sets out government
protective security policy and supports entities to effectively implement the policy across the
following outcomes: security governance, information security, personnel security and physical
security.
https://www.protectivesecurity.gov.au/
This site provides information about the Protective security policy framework
The Australian Government Business site has information on how to create a cyber security policy to
protect an organisation and plan how to respond if an incident occurred.
https://business.gov.au/online/cyber-security/create-a-cyber-security-policy
Learning Activity: Reviewing Cyber security policy
This learning activity will occur in the classroom in small groups, or you will write your responses
in your activity worksheet.
Access the Victorian Department of Health and Human Services Privacy and information security
guideline for funded agency staff and answer these questions.
1. Passwords – choose 1 requirement. Explain what the network vulnerability is and how this
requirement will provide security protection for the organisation.
2. Clear desks and screens – choose 1 requirement. Explain what the network vulnerability is
and how this requirement will provide security protection for the organisation.
What is at risk
A business’ money, information, technology and reputation could be at risk. This could include the
destruction, exposure or corruption of the following:
customer records and personal information
email records
financial records
business plans
new business ideas
marketing plans
intellectual property
product design
patent applications
employee records (which could include sensitive personal identifiable information such as
their date of birth).
Source: © Commonwealth of Australia 2020. Australian Government Business. All content on business.gov.au is under a
Creative Commons Attribution 3.0 Australia,
https://business.gov.au/online/cyber-security/cyber-security-and-your-business
Web Link: Cyber Security and Australian Small Businesses Results from the Australian Cyber
Security Centre Small Business Survey
https://www.cyber.gov.au/sites/default/files/2020-07/ACSC%20Small%20Business%20Survey
%20Report.pdf
https://www.cyber.gov.au/learn
Using a secure network access the ACSC website and take this 3 minute quiz to see how cyber
secure your practices are.
Number system employing 2 as the base. This system requires only two digits, 0
Binary number
and 1. The decimal number system (or base ten) requires 10 digits: 0, 1, 2, 3, 4,
system
5, 6, 7, 8, 9.
Hexadecimal or hex number (or base 16) requires 16 symbols or digits from 0 to
9, followed by six alphabetic characters A, B, C, D, E and F. This system allows for
Hexadecimal
the representation of large numbers with fewer digits. For example, the decimal
number
number 50485 in binary is represented by 1100010100110101 and in
system
hexadecimal notation is represented as C535. Every four binary symbols can be
represented by a single hex symbol.
For example, the hexadecimal number 123 is represented as follows: 123 = 1 * 162 + 2 * 161 + 3 *
160 * 0 = 1 * 256 + 32 + 3 = 291 (base 10)
Video Link: Introduction to Number Systems
https://www.youtube.com/watch?
v=crSGS1uBSNQ&list=PLBlnK6fEyqRjMH3mWf6kwqiTbT798eAOm&index=29
https://www.youtube.com/watch?v=M41M9ATm49M
This video series explains some of the core concepts behind binary numbers in computing
0 0000 0
1 0001 1
2 0010 2
3 0011 3
4 0100 4
5 0101 5
6 0110 6
7 0111 7
8 1000 8
9 1001 9
10 1010 A
12 1100 C
13 1101 D
14 1110 E
Binary to hexadecimal
1. Start at the rightmost digit and break the binary number up into groups of four digits. These
are known as nibbles. If there are less than four digits, use just that number of digits for that
group.
2. Next, convert each group of four digits into decimal.
3. Convert each decimal value into its hex equivalent.
4. Put the hex digits together.
Example - 1101 to hex
1101 = decimal 13
13 = hex D
Result - D
Example - 11000011 to hex
Break into groups of four - 1100 0011
1100 = decimal 12 0011 = decimal 3
12 = hex C 3 = hex 3
Result - C3
Example - 110011 to hex
Break into groups of four - 0011 0011. In this example, extra 0s are added at the highest values to
create two groups of four bits.
0011 = decimal 3 0011 = decimal 3
3 = hex 3 3 = hex 3
Result - 33
https://www.youtube.com/watch?v=tSLKOKGQq0Y
This video tutorial explains how To Convert Binary to Hexadecimal
https://www.youtube.com/watch?
v=2U9b76JRz7s&list=PLBlnK6fEyqRjMH3mWf6kwqiTbT798eAOm&index=31
Decimal to hexadecimal
The AQA specification requires you to be able to convert from decimal to numbers containing
multiple digits in hexadecimal. To convert:
If the decimal number is bigger than 16, divide it by 16. Take the hexadecimal equivalent of
this result - this represents the first digit. Take the hexadecimal equivalent of the remainder
- this represents the second digit.
If the decimal number is smaller than 16, take the hexadecimal equivalent of the decimal
number.
Example - convert decimal 22 to hexadecimal
16 goes into 22 once with 6 left over, so 22 ÷ 16 = 1 remainder 6
1 = hex 1
6 = hex 6
Result - 16
Example - convert 138 to hexadecimal
138 ÷ 16 = 8 remainder 10
8 = hex 8
10 = hex A
Result - 8A
https://www.youtube.com/watch?
v=uVpQ9pPskNI&list=PLBlnK6fEyqRjMH3mWf6kwqiTbT798eAOm&index=33
Hexadecimal to binary
1. Split the hex number into individual values.
2. Convert each hex value into its decimal equivalent.
3. Next, convert each decimal digit into binary, making sure to write four digits for each value.
4. Combine all four digits to make one binary number.
Example - hex 28 to binary
https://www.youtube.com/watch?
v=1tHgs0mrZ5I&list=PLBlnK6fEyqRjMH3mWf6kwqiTbT798eAOm&index=36
ANSWER
11
Choose an item.
Choose
an Choose an item.
item.2B
Choose
an Choose an item.
item.FA
Choose an item.Moodle: Drop down box
17
43
250
ANSWER
11
Choose an item.
Choose
Choose an item.
an
ANSWER
item.2B
Choose
an
Choose an item.
item.A
A
Choose an item.Moodle: Drop down box
00010001
00101011
10101010
4 octets
IVP Protocols
IPv6 is also an alphanumeric address separated by colons, while IPv4 is only numeric and separated
by periods. Again, here’s an example of each:
IPv4 – 192.168.10.150
IPv6 – 3002:0bd6:0000:0000:0000:ee00:0033:6778
Media access control address (MAX)
A MAC address is a 12-digit hexadecimal number assigned to each device connected to the network.
A MAC address is a hardware identifier that identifies a unique "network interface" in a device In the
OSI model, the MAC sublayer of the data-link layer (Layer 2) implements MAC addresses.
A MAC address is a 12-digit string where each digit can be any number from 0 to 9 or a letter
between A and F. Here is an example.
https://www.youtube.com/watch?v=LIzTo6e4FgY
https://www.youtube.com/watch?
v=EDAnsWpOjGM&list=PLF1hDMPPRqGxpYdo0ctaa7MxfOi9vjs1u&index=8
https://www.youtube.com/watch?
v=irhS0ASkvy8&list=PLF1hDMPPRqGxpYdo0ctaa7MxfOi9vjs1u&index=9
Application Layer Application Layer HTTP SMT Telnet FTP DNS RIP SNMP
P
Presentation Layer
Session Layer
IP
Data Link Layer Network Access Ethernet Token ATM Frame Relay
Layer Ring
Physical Layer
2. Presentation Format the data according to the MPEG, ASCH, SSL, TLS
sstax of the application.
5. Network Receives frames sent by the data link IPV4, IPV6, ICMP,
layer and delivers the frames to their IPSEC, ARP, MPLS.
intended destinations as per the
addresses contained inside the frame.
TCP/IP is a set of standards that defines how to establish and maintain a network conversation by
which applications can exchange data. These rules allow computers to communicate over the
internet. Some common functions for using TCP/IP are electronic mail, computer-to-computer file
transfer, and remote login.
The TCP/IP protocol suite functions as an abstraction layer between internet applications and the
routing and switching fabric.
To interconnect a TCP/IP network with other networks, you must obtain a unique IP address for your
network.
TCP/IP includes commands and facilities that allow you to:
Transfer files between systems
Log in to remote systems
Run commands on remote systems
Print files on remote systems
Send electronic mail to remote users
Converse interactively with remote users
Manage a network.
https://www.ibm.com/docs/en/aix/7.2?topic=management-transmission-control-protocolinternet-
protocol
IBM provide further information on TCP/IP terminology, planning a TCP/IP network, installation
configuration, methods of communications, file transfers and displaying status information.
https://docs.oracle.com/cd/E18752_01/html/816-4554/ipov-6.html
This site resents an in-depth introduction to the protocols that are included in TCP/IP.
DIFFERENCES COMMONALITIES
OSI has 7 layers - TCP/IP has 4 layers. Both models have a Transport Layer, whose
purpose is to provide services on top of
The OSI Model is a logical and conceptual
packet delivery such as segmentation,
model TCP/IP that helps you to determine
reliable delivery, and endpoints within end-
how to connect a specific computer to the
devices (ports).
Internet and how the transmission will take
place. Both models are logical
OSI header is 5 bytes - TCP/IP header size is Both define networking standards
20 bytes.
Both use the IEEE standards for Ethernet
OSI refers to Open Systems
Both divide the communication into a number
Interconnection, whereas TCP/IP refers to
of layers
Transmission Control Protocol.
OSI follows a vertical approach - TCP/IP
follows a horizontal approach.
OSI model, the transport layer, is only
connection-oriented in the TCP/IP model is
both connection-oriented and
connectionless.
OSI model is developed by ISO
(International Standard Organization) - TCP
Model is developed by ARPANET (Advanced
Research Project Agency Network).
OSI model allows you to standardise a router, a
switch, a motherboard, and other hardware -
TCP/IP allows you to establish a connection
between different types of computers.
https://www.youtube.com/watch?v=LX_b2M3IzN8
https://www.youtube.com/watch?v=614QGgw_FA4
https://www.ibm.com/docs/en/aix/7.2?topic=protocol-tcpip-network-interfaces
IBM have further information about TCP/IP Network Interface Layer standards.
https://www.oreilly.com/library/view/windows-nt-tcpip/1565923774/ch01s05.html
This site provides further information on the Internet layer and protocols.
To connect to a server using TLS, the client and the server exchange the so-called TLS handshake
sequence. The sequence goes through the following steps:
Negotiation: The two parties agree on the TLS version and the cipher suite they will be using
Authentication: The server’s identity is authenticated via the certificate (there are also types
of TLS handshake that require the client’s authentication)
Encryption: Session keys (i.e. the master secret) that will be necessary to encrypt traffic are
established with the use of the public and private keys of each party
Message authentication: A message authentication code (MAC) is provided by the TLS
protocol to ensure the integrity and authenticity of each exchanged message
Video Link: What are TLS Security Settings and how to enable TLS Encryption
https://www.youtube.com/watch?v=BgXKkm6hpPo
This video explains what is TSL encryption, how it works, its vulnerabilities and how to prevent TLS
vulnerabilities.
HTTPS provides protection against these vulnerabilities by encrypting all exchanges between a web
browser and web server. An HTTPS URL begins with https:// instead of http://. An example of this is
when purchasing on a retailer' s e-commerce website, when they are ready to place an order, they
are directed to the product's order page. The URL of this page starts with https://, not http://.
HTTPS is based on the TLS encryption protocol, which secures communications between two parties.
TLS uses asymmetric public key infrastructure for encryption. This means it uses two different keys:
The private key. This is controlled and maintained by the website owner and resides on the
web server. It decrypts information that is encrypted by the public key.
The public key. This is available to users who want to securely interact with the server via
their web browser. The information encrypted by the public key can only be decrypted by
the private key.
https://www.youtube.com/watch?v=j9QmMEWmcfo
HTTPS is a secure protocol that tells visitor the website has an additional layer of security.
Learning Activity: The Cisco online NetAcad Cybersecurity - Cisco CCNA 200-301
This program is not essential to complete your course, but is highly recommended.
https://learningnetwork.cisco.com/s/ccna-exam-topics?ccid=ccna&dtid=website&oid=cdc-ccna-
exam
Chapter 1 Network Fundamental
https://support.microsoft.com/en-us/topic/preventing-smb-traffic-from-lateral-connections-and-
entering-or-leaving-the-network-c0541db7-2244-0dce-18fd-14a3ddeb282a
Video Link: What is the SMB protocol & how does it work?
https://www.youtube.com/watch?v=csocwMe7l_E&feature=emb_logo
https://nordvpn.com/blog/what-is-smb/
https://learn.microsoft.com/en-us/windows-server/storage/file-server/file-server-smb-overview
https://www.youtube.com/watch?v=EkVd4k0R4Tw
This video provides information about QUIC protocol , who uses it and its purpose.
https://peering.google.com/#/learn-more/quic
https://www.rfwireless-world.com/Terminology/LTE-NB-IoT-Protocol-Stack.html#:~:text=NB%2DIoT
%20protocol%20stack%20has,PDCP%2C%20RRC%20and%20NAS%20layers.
https://www.youtube.com/watch?v=pf7wcl1IZYc
https://www.youtube.com/watch?v=dOGTdWm6kvw
https://www.youtube.com/watch?v=WdJxXzSE9Gs
This program is not essential to complete your course, but is highly recommended.
The program includes information on IoT, along with emerging technologies such as data analytics
and artificial intelligence and cybersecurity, are digitally transforming industries.
https://skillsforall.com/course/introduction-iot?
utm_medium=event&utm_source=skillsforall.com&utm_campaign=writ&utm_content=getstarte
dbuttoni2iot&utm_team=field_global
Further your knowledge of how the rapid growth of digital networks is transforming our lives and
industries - from connected appliances to smart factory equipment - and creating new economic
opportunities.
https://www.ibm.com/docs/en/powerha-aix/7.2?topic=networks-physical-logical
https://www.dnsstuff.com/physical-logical-network-diagram
https://www.cisco.com/c/en/us/solutions/small-business/resource-center/networking/network-
switch-how.html
https://www.cisco.com/c/en/us/solutions/small-business/resource-center/networking/how-does-a-
router-work.html
Learning Activity: Cisco Cybersecurity Essentials 6.2.4.4 Router and Switch Resilience
In this Packet Tracer activity, you will complete the following objectives:
Hardening the IOS Configuration
Activating the Cisco IOS Resilient Configuration Feature
Web Link: Cisco Cybersecurity Essentials 6.2.4.4 Router and Switch Resilience
https://contenthub.netacad.com/legacy/CyberEss/1.1/en/index.html#6.2.4.4
4.3 Firewalls
A firewall is a network security device that monitors incoming and outgoing network traffic and
decides whether to allow or block specific traffic based on a defined set of security rules .These may
be referred to as firewall rules. Firewalls can be software, hardware, or a combination of both.
A firewall’s purpose is to establish a barrier between an organisation’s internal network and
incoming traffic from external sources (such as the internet) in order to block malicious traffic.
The difference between firewalls with one another is usually in how tight the security and selectivity
of access, and the scope of protection at various layers of the OSI.
Melbourne Polytechnic Page 43 of 56
VU23213 Utilise basic network concepts and protocols required in cyber security
Learner Resource
Firewall itself has several functions to protect networking devices:
As a Network Security Post – a firewall will try to filter the network traffic in accordance
with the security policies or firewall rules
Installed for File Transfer Protocol (FTP) to prevent data leakage
Record user activity – when you access data, network users will go through a firewall which
then records it as documentation
Prevent Modification of Other Party Data.
Proper setup and maintenance of your firewall are essential to keep your network and devices
protected.
Default to
connection
denial for
inbound traffic Data backups
Use antivirus
for network
protection
hosts
Firewall
Update network Segmented
firewalls security network:
practices
https://www.kaspersky.com.au/resource-center/definitions/firewall
This site provides extensive information about the function and operation of a firewall.
https://www.youtube.com/watch?v=x1YLj06c3hM
This video provides an overview of the function and operation of a firewall.
https://www.youtube.com/watch?v=rgcqxwO4GCs
Watch the How to check your firewall settings video then follow the steps shown in the video to
check your devices firewall settings. Record the settings below.
Incoming connections:
Active public networks:
Notification state:
Web Link: CISCO Set up a Wireless Network using a Wireless Access Point (WAP)
https://www.cisco.com/c/en/us/support/docs/smb/wireless/cisco-small-business-100-series-
wireless-access-points/smb5530-set-up-a-wireless-network-using-a-wireless-access-point-wap.html
https://www.youtube.com/watch?v=OxiY4yf6GGg
This video provides information about the different functions of WAP and Wi-fi router.
Wireless endpoints are physical devices that connect to a network system such as mobile devices,
desktop computers, virtual machines, embedded devices, and servers. When a device connects to a
network, there is a flow of information between networks. Internet-of-Things devices—like
cameras, lighting, refrigerators, wearables, security systems, smart speakers, Point of sale (POS)
systems, and thermostats—are also endpoints.
Endpoints are targets for cyber-attacks as they are an entry point to data, and rely on users
implementing security measures.
https://www.kaspersky.com/resource-center/definitions/what-is-endpoint-security
On Kaspersky’s site they provide further information on end points and the importance of security
protection.
4.5.3 Ping
Ping (or ping) is the most commonly known network troubleshooting command. Ping sends an ICMP
echo request to a host computer over an IP network. If the host is reachable, it sends back an ICMP
echo reply, and reports the time it took to reach the host and other data such as errors or packet
loss.
To use the ping command, go to the command prompt and enter ‘ping’ followed by the IP address or
the URL. ping www.google.com
https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/ping
This Microsoft site provides examples of ping command outputs and parameters.
4.5.4 Traceroute/Tracert
Traceroute traces the route between a source and the destination. It reports back the IP addresses
of all the routers involved.
In Windows systems, type tracert followed by hostname. For example: tracert www.googlecom
https://www.youtube.com/watch?v=vJV-GBZ6PeM
4.5.5 Netcat
The Netcat (nc) command is for reading and writing data between two computer networks using
either TCP or UDP. Netcat functions as a back-end tool that allows for port scanning and port
listening. The command differs depending on the system (netcat, nc, ncat, and others).
https://www.linuxfordevices.com/tutorials/netcat-command-in-linux
https://www.youtube.com/watch?v=W2-phl3tY3o
Summary Learning Activity: CISCO CCNA 7: Switching, Routing, and Wireless Essentials
You are invited to explore the CISCO course CCNA 7: Switching, Routing, and Wireless Essentials
CCNA 7: Switching, Routing, and Wireless Essentials
You can further enhance your knowledge and skill in switching technologies and router operations
that support small-to-medium business networks, including wireless local area networks (WLAN)
and security concepts.
https://www.youtube.com/watch?v=eyNBf1sqdBQ
https://www.techtarget.com/searchnetworking/tip/How-network-virtualization-works
https://www.youtube.com/watch?v=tifTN315SVI
Distributed Denial of Service (DDoS) attacks are evolving to become more prevalent and
sophisticated. A DDoS attack occurs when multiple systems orchestrate a synchronized DoS attack to
a single target. The same methods of attack as DoS flooding the target or sending it information but
it is from multiple locations at once.
https://www.youtube.com/watch?v=CqsX2Tg8abs
This video by Telstra discusses DDOS solutions
Infection The malicious code or code block prepared by the cyber attacker starts to
spread on the targeted IT network.
Staging The attacker tries to embed the ransomware into the system that it is
penetrating by making minor changes to the cyber-attack vector.
Scanning Occurs when the ransomware starts scanning the IT network to identify the
files to encrypt. The authorised access definitions and permission levels in the
system to determine the path the attacker can take after scanning.
Encryption Local files on the IT network are encrypted, then the ransomware moves to the
cloud, and shared files on the network. Data on the network is encrypted and
copied. Finally, the copied and encrypted data is uploaded again to replace the
original files on the network.
The ransom request is made by the attacker. Sometimes the attackers set a
Renumeration
time, and the ransom increases over time.
https://krontech.com/the-anatomy-of-a-ransomware-attack
https://www.youtube.com/watch?v=EuyV2O5D5_I
According to CISA, in 2022, 14 US critical sectors have been subjected to intense ransomware
attacks.
Access the Cyber gov website Performing a malware scan using Microsoft Defender Antivirus for
Windows 10
Follow each of the steps to perform a malware scan with Microsoft Defender Antivirus on your
device with a Microsoft 10 program.
This learning activity will take 15-20 minutes.
Australian Cyber Security Centre October 2021, Preparing for and Responding to Denial-of-
10/PROTECT%20-%20Preparing%20for%20and%20Responding%20to%20Denial-of-Service
%20Attacks%20%28October%202021%29.pdf>
Australian Cyber Security Centre 2023, Cyber security and your business s<
https://business.gov.au/online/cyber-security/cyber-security-and-your-business> accessed 16
January 2023
Australian Cyber Security Centre, Guidelines for Networking, accessed 10 February 2023, <
https://www.cyber.gov.au/sites/default/files/2022-12/21.%20ISM%20-%20Guidelines%20for
%20Networking%20%28December%202022%29.pdf>
Difference between Network Security and Cyber Security 2022, accessed 12 December 2022, <
https://www.geeksforgeeks.org/difference-between-network-security-and-cyber-security/>
Fujdiak, R.; Mikhaylov, K.; Stusek, M.; Masek, P.; Ahmad, I.; Malina, L.; Porambage, P.; Voznak,
M.; Pouttu, A.; Mlynek, P. Security in Low-Power Wide-Area Networks: State-of-the-Art and
Development toward the 5G. In LPWAN Technologies for IoT and M2M Applications; Elsevier:
Kadusic, Esad, Natasa Zivic, Christoph Ruland, and Narcisa Hadzajlic. 2022. "A Smart Parking
Solution by Integrating NB-IoT Radio Communication Technology into the Core IoT Platform" Future