Skip to content
โ† Back to Overview

Networks & Security

The world is connected. Understanding how packets travel from A to B (Networks) and how to stop bad actors from intercepting them (Security) is non-negotiable for a CPE.

1. The OSI Model ๐ŸŒ

The 7-layer framework you MUST memorize. "Please Do Not Throw Sausage Pizza Away"

LayerPDUFunctionExamples
7. ApplicationDataNetwork process to applicationHTTP, DNS, SMTP
6. PresentationDataEncryption, formattingSSL, JPEG
5. SessionDataInterhost communicationNetBIOS
4. TransportSegmentEnd-to-end connection, reliabilityTCP, UDP
3. NetworkPacketRouting, logical addressing (IP)IP, ICMP, Routers
2. Data LinkFramePhysical addressing (MAC)Ethernet, Switches
1. PhysicalBitMedia, signal, binary transmissionCables, Hubs

2. IP Addressing ๐Ÿ”ข

IPv4: 32-bit address. Dotted decimal (192.168.1.1).
IPv6: 128-bit address. Hexadecimal.

Subnetting

Borrowing bits from host ID to create networks.
CIDR (Classless Inter-Domain Routing) uses /notation (e.g., /24 means 24 bits for network, 8 bits for host).

3. CIA Triad of Security ๐Ÿ”’

Confidentiality

Only authorized access. Tools: Encryption, MFA.

Integrity

Data is accurate/unaltered. Tools: Hashing, Checksums.

Availability

Data is accessible when needed. Tools: Redundancy, DDoS protection.

4. Cryptography ๐Ÿ—๏ธ

  • Symmetric: Same key for encryption and decryption. Fast. (AES, DES). Issue: Key exchange.
  • Asymmetric (Public Key): Public key encrypts, Private key decrypts. Secure key exchange. (RSA, ECC). Slow.
  • Hashing: One-way transformation. Unique fingerprint. (SHA-256, MD5). Used for passwords and integrity.