Networking Basics in Cyber Security

In today’s interconnected world, understanding networking basics is essential for anyone interested in cybersecurity. Whether you’re a beginner or looking to refresh your knowledge, this article will provide a clear overview of key concepts that are the foundation of networking in cybersecurity.

Protocols are rules that manage data communication.

TCP (Transmission Control Protocol) is a widely used protocol that establishes connection-oriented communication.

IP (Internet Protocol) is responsible for addressing and routing data packets.

To understand networking, It is important to be familiar with the OSI (Open Systems Interconnection) model. It standardizes and clarifies networking protocol functions through seven layers, each serving a specific purpose in network communication. Understanding these layers provides a solid foundation for grasping how data moves through a network.

The model defines the necessary communication requirements on a network by organizing them into multiple layers.

LayerWhat it does
7 – ApplicationWhere humans process data and information
6 – PresentationEnsures data is in a usable format
5 – SessionCapable of maintaining connections
4 – TransportData is forwarded to a service capable of handling requests
3 – Network LayerResponsible for which path packets should travel on a network
2 – Data LinkResponsible for which physical device packets should go to
1 – PhysicalThe physical infrastructure (Internet cables) to transport data

The top 3 layers are typically implemented in software within the Operating System:

LayerWhere it is implemented
7 – ApplicationSoftware
6 – PresentationSoftware
5 – SessionSoftware

The bottom 3 layers are typically implemented in hardware within devices on the network, e.g. Switches, Routers and Firewalls:

LayerWhere it is implemented
3 – Network LayerHardware
2 – Data LinkHardware
1 – PhysicalHardware

Layer 4, the Transport layer, connects the software with the hardware layers.

SDN (“Software Defined Networking”) is a technology that allows more hardware layers to be implemented via software.

Reference: Cyber Security Networking Basics (w3schools.com)