{"id":979,"date":"2024-10-05T08:41:59","date_gmt":"2024-10-05T03:41:59","guid":{"rendered":"https:\/\/augurytech.co.uk\/courses\/?p=979"},"modified":"2025-05-19T16:19:35","modified_gmt":"2025-05-19T11:19:35","slug":"network-transport-in-cyber-security","status":"publish","type":"post","link":"https:\/\/augurytech.co.uk\/courses\/cyber-security\/network-transport-in-cyber-security\/","title":{"rendered":"Network Transport in Cyber Security"},"content":{"rendered":"\n<p style=\"font-size:clamp(1.125rem, 1.125rem + ((1vw - 0.2rem) * 0.204), 1.25rem);\"><strong>Network transport refers to the methods and protocols used to transfer data from one device to another over a network.<\/strong><\/p>\n\n\n\n<p>Think of it as the postal service for the internet, ensuring your data packets (like letters) reach their destination safely and securely.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-base-color has-text-color has-link-color wp-elements-14ff1f7ef7cd02aad832540a0ecb2f23\">Importance of Network Transport<\/h3>\n\n\n\n<p>Network transport is vital for maintaining the security and integrity of data as it travels across the internet. Here\u2019s why:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Integrity<\/strong>: Ensures that data is not altered during transmission.<\/li>\n\n\n\n<li><strong>Data Confidentiality<\/strong>: Protects data from being accessed by unauthorized users.<\/li>\n\n\n\n<li><strong>Data Availability<\/strong>: Ensures that data is available when needed, preventing disruptions.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-base-2-color has-text-color has-link-color has-large-font-size wp-elements-395d588c619c7a8d842da04e5de8f073\">Key Protocols in Network Transport<\/h2>\n\n\n\n<p>There are two main protocols used in network transport:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>TCP (Transmission Control Protocol)<\/strong><\/li>\n\n\n\n<li><strong>UDP (User Datagram Protocol)<\/strong><\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-353c4f5a wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading\">TCP (Transmission Control Protocol)<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.w3schools.com\/cybersecurity\/img_tcp-header.png\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reliable Communication: <\/strong>TCP ensures that data packets are delivered in the correct order and without errors. It\u2019s like sending a registered letter where you get a receipt confirming delivery.<\/li>\n\n\n\n<li><strong>Three-Way Handshake:<\/strong> TCP uses the three-way handshake process to establish a connection between devices. This involves three steps: \n<ol class=\"wp-block-list is-style-default\">\n<li><strong>SYN (synchronize)<\/strong><\/li>\n\n\n\n<li><strong>SYN-ACK (synchronize-acknowledge)<\/strong><\/li>\n\n\n\n<li><strong>ACK (acknowledge).<\/strong><\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.w3schools.com\/cybersecurity\/img_tcp-handshake-1.svg\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h3 class=\"wp-block-heading\">UDP (User Datagram Protocol)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Faster but Less Reliable:<\/strong> Unlike TCP, UDP does not guarantee the order or integrity of data packets. It\u2019s like sending a postcard \u2013 faster but with no delivery confirmation.<\/li>\n\n\n\n<li><strong>Use Cases:<\/strong> UDP is often used for live broadcasts and online gaming where speed is more important than reliability.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.w3schools.com\/cybersecurity\/img_udp-header.png\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-base-color has-alpha-channel-opacity has-base-background-color has-background is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<h2 class=\"wp-block-heading has-base-2-color has-text-color has-link-color wp-elements-2303322d253f1b4536609da56f9da33c\" style=\"font-size:clamp(1.25rem, 1.25rem + ((1vw - 0.2rem) * 1.224), 2rem);\">Common Threats to Network Transport<\/h2>\n\n\n\n<p>Understanding the threats to network transport can help in data security. Some common threats include:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Man-in-the-Middle Attacks<\/strong>: An attacker intercepts and possibly alters the data being transmitted.<\/li>\n\n\n\n<li><strong>DDoS Attacks (Distributed Denial of Service)<\/strong>: Overwhelms a network with traffic, making it unavailable to users.<\/li>\n\n\n\n<li><strong>Packet Sniffing<\/strong>: Unauthorized interception and analysis of data packets.<\/li>\n<\/ol>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-base-2-color has-text-color has-link-color wp-elements-424da2c1af3c7f53e8b092110ee03447\" style=\"font-size:clamp(1.25rem, 1.25rem + ((1vw - 0.2rem) * 1.224), 2rem);\">Protecting Network Transport<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Encryption<\/strong>: Encrypting data ensures that even if it is intercepted, it cannot be read without the decryption key.<\/li>\n\n\n\n<li><strong>Firewalls<\/strong>: These act as barriers between trusted and untrusted networks, blocking malicious traffic.<\/li>\n\n\n\n<li><strong>Intrusion Detection Systems (IDS)<\/strong>: These systems monitor network traffic for suspicious activity and alert administrators.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Network transport refers to the methods and protocols used to transfer data from one device to another over a network. Think of it as the postal service for the internet, ensuring your data packets (like letters) reach their destination safely and securely. Importance of Network Transport Network transport is vital for maintaining the security and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"wp-custom-template-cyber-security","format":"standard","meta":{"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[12],"tags":[],"class_list":{"0":"post-979","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-cyber-security"},"_links":{"self":[{"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/posts\/979","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/comments?post=979"}],"version-history":[{"count":20,"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/posts\/979\/revisions"}],"predecessor-version":[{"id":1571,"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/posts\/979\/revisions\/1571"}],"wp:attachment":[{"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/media?parent=979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/categories?post=979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/augurytech.co.uk\/courses\/wp-json\/wp\/v2\/tags?post=979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}