3. Networks

Network Security

Network Security 🔒

Introduction: Why Network Security Matters

students, every time you send a message, stream a video, log in to a school portal, or pay online, your device is using a network. That makes networks very useful, but also risky. Data can be stolen, changed, blocked, or misused if a network is not protected. Network security is the set of methods used to protect data, devices, and users on a network.

In IB Computer Science SL, you need to understand not just what network security tools exist, but why they are needed and how they work together. The big ideas are confidentiality, integrity, and availability. These are often called the CIA triad. Confidentiality means only authorized people can access data. Integrity means data stays accurate and unchanged unless authorized changes happen. Availability means services and data are ready when users need them.

In this lesson, you will learn key network security terms, common threats, and the main ways organizations protect networks. You will also see real-world examples such as school Wi-Fi, online shopping, and cloud services. ✅

Main Threats to Network Security

A network can be attacked in many ways. One common threat is unauthorized access, where someone gets into a system without permission. This may happen if a password is weak, reused, or stolen.

Another threat is malware, which is malicious software designed to damage systems, steal data, or spy on users. Examples include viruses, worms, spyware, ransomware, and Trojan horses. Ransomware is especially dangerous because it can encrypt files and demand money to unlock them.

Phishing is also a major threat. This is when an attacker pretends to be a trusted person or organization in order to trick users into revealing passwords, bank details, or other sensitive information. A fake email that looks like it came from a school login page is a classic example.

Denial of service attacks, often written as $DoS$, aim to make a network service unavailable. The attacker overloads the server with so many requests that legitimate users cannot connect. A distributed denial of service attack, $DDoS$, uses many devices at once, which makes it harder to stop.

Other risks include eavesdropping, where an attacker listens to network traffic, and man-in-the-middle attacks, where someone secretly intercepts or changes communication between two parties. These threats show why network security is not just about passwords. It is about protecting the whole system. 🛡️

Security Measures Used on Networks

Organizations use several layers of security because one tool alone is not enough. This is called defense in depth. The idea is simple: if one layer fails, another layer can still help protect the network.

A firewall is one of the most important tools. It filters network traffic based on rules. For example, a school firewall may allow web browsing but block suspicious traffic or unsafe sites. Firewalls can be hardware devices, software programs, or both.

Encryption is another key method. Encryption changes readable data, called plaintext, into unreadable data, called ciphertext. Only someone with the correct key can decrypt it. This is especially important when data travels across public networks like the Internet. For example, when you visit a secure website, the connection often uses $HTTPS$, which relies on encryption to protect data such as passwords and payment details.

Authentication checks whether a user really is who they claim to be. A password is one form of authentication, but stronger methods exist. Two-factor authentication, $2FA$, requires two different proofs of identity, such as a password plus a code sent to a phone. This makes account theft much harder.

Access control limits what different users can do. For example, a student account on a school network should not have the same permissions as a system administrator. If a student account is compromised, access control can reduce the damage.

Antivirus software detects, blocks, and removes known malware. It works by checking files and behavior for signs of malicious code. However, it must be updated often because new malware appears regularly.

Security patches and updates are also essential. Developers fix weaknesses in software after they are discovered. If updates are ignored, attackers may exploit known vulnerabilities.

How Data Is Protected During Transmission

Network security is closely linked to data transmission. When data is sent over a network, it moves through many devices and cables, or through wireless signals. At each stage, it may be exposed to interception or corruption.

Encryption helps protect data during transmission. For example, if students sends a login form over an unsecured connection, someone monitoring the traffic might read it. If the same form is sent over an encrypted connection, the data is far harder to understand even if intercepted.

Checksums and error detection also support security and reliability. A checksum is a value calculated from data. The receiving device recalculates the value to check whether the data changed during transmission. If the values do not match, the data may be corrupted and should be resent.

Digital signatures add another layer of trust. A digital signature is created using cryptographic techniques to prove that a message came from a particular sender and was not altered. This is important for software downloads, online documents, and secure communication.

These methods show that network security is not separate from networking itself. It is built into how data is transmitted, checked, and trusted. 📡

Authentication, Authorization, and Identity

These three terms are often confused, but they mean different things.

Authentication answers the question: “Who are you?” It verifies identity using something you know, something you have, or something you are. A password is something you know. A smart card or phone code is something you have. A fingerprint is something you are.

Authorization answers the question: “What are you allowed to do?” After a user logs in, the system decides which files, settings, or services they can access. For example, a teacher may be authorized to change grades, while a student is not.

Accounting or auditing records what users did. Logs can show who logged in, when they logged in, and which files they accessed. This is useful for tracking misuse and investigating incidents.

A strong security system uses all three. Authentication proves identity, authorization limits access, and auditing helps detect problems after they happen.

Common Real-World Examples

Think about online banking. When students checks a bank balance, the website must protect personal data, verify identity, and stop attackers from intercepting sensitive information. Encryption, strong authentication, and fraud detection are all used.

In a school network, students usually connect through Wi-Fi. The school may use a password-protected wireless network, a firewall, and filters to block harmful websites. If devices are shared, user accounts and permissions help prevent one student from accessing another student’s files.

In cloud storage, files are stored on remote servers. The provider uses access control, backups, encryption, and monitoring to protect data. But users still have responsibility too. A weak password or careless sharing setting can expose files even if the provider’s systems are secure.

These examples show that network security is shared responsibility. Technology helps, but user behavior matters as well. ✅

Applying IB Reasoning to Network Security

In IB Computer Science SL, you may need to explain why a security measure is suitable for a particular situation. This means choosing the right tool for the right risk.

For example, if a company wants to protect employees working from home, a firewall alone is not enough. The company may also need $VPN$ access, which creates an encrypted tunnel between the user and the company network. This helps keep traffic private over public Internet connections.

If a website stores user passwords, it should not store them as plain text. Instead, it should store hashed passwords. A hash is a one-way function that converts data into a fixed-length value. If attackers steal the database, they should not be able to read the original passwords easily.

If a school wants to stop unauthorized login attempts, it can use strong passwords, $2FA$, account lockouts after repeated failed attempts, and security education for students and staff.

When answering exam questions, students should identify the threat first, then choose a defense, and finally explain how the defense reduces the risk. This kind of reasoning is exactly what IB expects. 💡

Conclusion

Network security is essential because networks connect people, devices, and services across large distances. That connection creates many benefits, but also many risks. To protect networks, we use tools like firewalls, encryption, authentication, access control, antivirus software, updates, and monitoring. We also need good user behavior and careful design.

The most important idea is that security is layered. No single method is perfect, so systems combine several protections to reduce risk. Network security fits naturally within the Networks topic because it supports safe data transmission, reliable communication, and trust in digital systems. Whether students is using school Wi-Fi, sending a message, or logging into a website, network security is working behind the scenes to keep information safe. 🔐

Study Notes

  • Network security protects data, devices, and users on a network.
  • The CIA triad means confidentiality, integrity, and availability.
  • Common threats include malware, phishing, unauthorized access, $DoS$ attacks, eavesdropping, and man-in-the-middle attacks.
  • A firewall filters network traffic using rules.
  • Encryption protects data by converting plaintext into ciphertext.
  • $HTTPS$ uses encryption to protect web communication.
  • Authentication checks identity; authorization controls what a user can do; auditing records user activity.
  • Two-factor authentication, $2FA$, makes login more secure by requiring two proofs of identity.
  • Antivirus software helps detect and remove malware.
  • Security patches fix known weaknesses in software.
  • Checksums and digital signatures help verify data integrity and trust.
  • A $VPN$ creates an encrypted connection over a public network.
  • Hashed passwords are safer than plain text passwords.
  • Defense in depth means using multiple layers of security.
  • Network security is closely connected to data transmission, reliability, and safe access in IB Computer Science SL.

Practice Quiz

5 questions to test your understanding

Network Security — IB Computer Science SL | A-Warded