Module 3 — Network Security Fundamentals

Every connected device relies on networks — but every network can be attacked.
This module introduces the core concepts of networking and teaches you how to protect both wired and wireless systems.
We’ll explore how data moves across networks, how firewalls and intrusion detection work, and how to safely observe network traffic inside a virtual lab.

💡 Learning Objectives

By the end of this module, you will:

  • Understand how data travels across networks (IP, TCP, ports).

  • Configure and explain the function of firewalls.

  • Differentiate between WPA2 and WPA3 Wi-Fi standards.

  • Identify how IDS/IPS systems detect threats.

  • Perform a practical lab: router hardening and packet observation.

1. Networking Basics — How the Internet Works

When you visit a website or send a message, information is broken into packets and sent through multiple layers.

Core Concepts:

ConceptDescription
IP (Internet Protocol)Assigns addresses (like “house numbers”) to devices.
PortA communication channel (e.g., port 80 = HTTP, port 443 = HTTPS).
TCP/UDPProtocols for sending and receiving data packets.
LAN/WANLocal vs. wide area networks — home network vs. the internet.
Router/SwitchDevices that direct traffic and connect multiple systems.

🧩 Analogy: Think of IP addresses as street addresses, ports as apartment numbers, and packets as envelopes.

 

2. Firewalls — The Gatekeepers

A firewall controls what traffic can enter or leave your system.

Types of Firewalls:

TypeWhere UsedExample
Host FirewallOn a PC or serverWindows Defender Firewall
Network FirewallOn a router/gatewayCisco, pfSense, FortiGate
Next-Gen Firewall (NGFW)Advanced filtering & application controlPalo Alto, Sophos XG

Rule Example:

“Allow HTTPS (port 443) outbound; block all inbound except SSH (port 22) from LAN.”

Best Practices:

  • Deny by default, then allow required ports.

  • Disable unused services.

  • Regularly check logs for blocked attempts.

3. Wireless Security (WPA2 vs WPA3)

Your home Wi-Fi can be a major vulnerability if left unsecured.

FeatureWPA2WPA3
EncryptionAES-CCMPSAE (stronger handshake)
Password CrackingEasier (dictionary attacks)Resistant (individualized encryption)
Backward CompatibilityYesPartial
Recommended?⚠️ Outdated✅ Modern & Secure

Wi-Fi Hardening Tips:

  • Change default SSID and admin credentials.

  • Use WPA3 if available.

  • Disable WPS (Wi-Fi Protected Setup).

  • Update router firmware regularly.

  • Turn off remote management.

4. Intrusion Detection & Prevention (IDS/IPS)

Even with firewalls, you need visibility into what’s happening on your network.

IDS (Intrusion Detection System):

  • Monitors network traffic for suspicious activity.

  • Alerts you but doesn’t block automatically.

  • Example tools: Snort, Suricata.

IPS (Intrusion Prevention System):

  • Detects and blocks malicious packets in real time.

  • Often integrated into enterprise firewalls.

Common Detection Signals:

  • Multiple failed logins (brute-force attempts)

  • Large data transfers (exfiltration)

  • Connections to known malicious IPs

In a lab environment, IDS tools can show how malware communication looks — without causing harm.

5. Practical (Safe) Exercises

Exercise 1 — Router Hardening

Goal: Secure your personal or lab router.

  1. Log in to your router’s admin panel (typically 192.168.1.1).

  2. Change default admin credentials.

  3. Update firmware to the latest version.

  4. Set encryption to WPA3 or WPA2-AES (not TKIP).

  5. Disable WPS and remote access.

  6. Save a backup config securely.

🧩 Document each change and note why it improves security.

Exercise 2 — Observe Network Packets (Read-Only)

Tools: Wireshark (free), installed on a virtual machine.

  1. Open Wireshark → choose your active network adapter.

  2. Capture traffic for 1–2 minutes (no sensitive sites).

  3. Stop capture and observe:

    • Common protocols: TCP, UDP, DNS, ARP

    • Conversations between your system and known sites

  4. Identify non-sensitive packets and note their function.

⚠️ Safety: Never capture or share others’ data or credentials. Perform this only in a private, non-production environment.

Ethics & Legal Practice

Monitoring or intercepting network traffic without authorization is illegal under IT and privacy laws.
Always:

  • Capture traffic only on your own networks.

  • Use lab simulations for educational purposes.

  • Get written permission before any corporate or external testing.

💡 Quick Tips Box

💡 Tip: Change your Wi-Fi password every 6–12 months.
⚙️ Tip: Set your router to auto-update firmware if supported.
🔍 Tip: Review firewall logs monthly for unusual patterns.

6. Summary & Takeaways

You now understand how networks function — and how to defend them.

✅ Key lessons:

  • Networking = communication + protocols + addressing.

  • Firewalls act as traffic filters.

  • Wi-Fi encryption matters — upgrade to WPA3.

  • IDS/IPS provide visibility into hidden threats.

  • Router hardening is your first real defensive action.

🧱 Next Up: Module 4 — Introduction to Malware & Common Attacks →

Leave a comment

Index