10 29 2025 - rtji0/Arthur-Tech-Journal GitHub Wiki

Networking Fundamentals

Data

Host

Receiver

Medium - How is the data transferred: wired, wireless? What kind?

Protocol - Set of rules which determine how devices communicate

Common Network Topologies

Bus, Ring, Star

Mesh Topology

hq720

Network Vulnerabilities

  • No written security policy

  • No policy for hardware and software installations/updates

  • Lack of disaster recovery and business continuity plans

  • No incident response team

  • No policy on use of official assets

  • No policy on teleworking or working from home

Weak Tech Related Vulnerabilities

  • TCP/IP Apps and protocols

  • OS

  • Network Device

How are Networks Attacked?

  • RECON - gaining knowledge of targets, network topology, hard/software etc

  • "Scan n Sniff" - scanning for open ports + services, holes, vulnerabilities

DDoS Attacks

  • DDoS - makes network inaccessible by generating unmanageable amount of network traffic

  • Ping of death - pinging with an IP packet whose size exceeds maximum size specified

  • SYN flood - attacker sends many junk SYNs, consuming network/system resources while blocking other communications

  • Smurf attack

Prevention

  • Hardening all network equipment with appropriate configurations/patching including firmware updates