Network Security Basics Report
Network Security Basics Report
1. Introduction
Network security is the practice of protecting network infrastructure, devices, and data from
unauthorized access, cyber threats, and potential attacks. With the increasing reliance on
digital communication and data transfer, securing networks has become a crucial aspect of
cybersecurity. This report explores different network threats, basic security measures, traffic
monitoring techniques, and best practices for a secure network.
2. Network Threats
A network is vulnerable to various threats, including malware, unauthorized access, and
social engineering attacks. Below are some common network threats and their impacts:
a) Viruses
A virus is a type of malicious software (malware) that attaches itself to a legitimate file or
program. It spreads when the infected file is executed, often corrupting data or damaging
system functionality.
Example:
b) Worms
Unlike viruses, worms do not require user interaction to spread. They replicate themselves
and exploit network vulnerabilities to infect multiple systems.
Example:
c) Trojans
Trojans disguise themselves as legitimate software but contain malicious code that grants
unauthorized access to attackers.
Example:
A fake antivirus program claiming to remove malware but actually stealing user
credentials.
d) Phishing
Phishing attacks deceive users into providing sensitive information, such as usernames and
passwords, through fake emails or websites.
Example:
An email pretending to be from a bank, prompting users to enter their account details
on a fraudulent website.
Example:
These attacks overwhelm a network or website with excessive traffic, causing service
disruptions.
Example:
A botnet attack floods a website with millions of fake requests, making it unavailable
to real users.
Configured a secure home Wi-Fi network with a router and multiple connected
devices.
Ensured that all devices had updated security patches and operating systems.
b) Configuring a Firewall
Enabled Windows Defender Firewall to filter network traffic and block unauthorized
access.
Created custom firewall rules to allow only essential services and applications.
Wireshark was used to capture and analyze live network traffic, helping to understand data
flow and detect anomalies.
HTTP Traffic: Unencrypted web browsing data, including requests and responses.
DNS Traffic: Resolves domain names to IP addresses, essential for internet
browsing.
Encrypted Traffic (TLS/SSL): Secure communication protocols for websites
(HTTPS).
6. Conclusion
Network security is a fundamental aspect of protecting digital infrastructure. Understanding
threats like viruses, worms, and phishing attacks, and implementing basic security measures
like firewalls and encryption, significantly reduce risks. By monitoring network traffic and
following best security practices, users can safeguard their personal and professional data
against cyber threats. Continuous learning and awareness are key to staying ahead of
evolving security challenges.
7. References
Wireshark User Guide
Microsoft Security Documentation
National Institute of Standards and Technology (NIST) Cybersecurity Framework