CyberCode Academy

Course 10 - Network Security Fundamentals | Episode 1: Models, Security, Protocols, and IP Addressing


Listen Later

In this lesson, you’ll learn about:
  • Networking communication frameworks, including the OSI and TCP/IP models
  • Identity and Access Management (IAM) and the AAA security model
  • Secure and insecure network protocols
  • IPv4 and IPv6 addressing fundamentals
I. Networking Models and Communication Frameworks OSI Model (Open Systems Interconnection) — 7 Layers A standardized reference model used globally to explain network communication. Data moves through the layers using encapsulation (adding headers/footers) and de-encapsulation (removing them). Each layer communicates only with its direct neighbors.
  • Layer 1 — Physical:
    Handles the transmission of bits over physical media (cables, radio waves).
    Devices: NICs, hubs, repeaters.
  • Layer 2 — Data Link:
    Responsible for LAN communication using MAC addresses (48-bit hex).
    Devices: Switches, bridges.
    Protocols: Ethernet, ARP (maps IP → MAC).
  • Layer 3 — Network:
    Handles routing and logical addressing.
    Protocols: IP, IPsec, ICMP.
    Devices: Routers.
  • Layer 4 — Transport:
    Handles data delivery using:
    • TCP: Reliable, connection-oriented
    • UDP: Fast, connectionless (e.g., VoIP)
      TLS/SSL also function here for secure data transfer.
  • Layers 5–7 — Session, Presentation, Application:
    • Session: Controls communication sessions (simplex, half-duplex, full-duplex).
    • Presentation: Formats data (JPEG, MP4, ASCII).
    • Application: Interfaces with the user (HTTP, FTP, email protocols).
TCP/IP Model — 4 Layers An older, more practical model used in real networks (ARPANET origin).
Layers: Application, Transport, Internet, Link. II. Security and Access Management (IAM & AAA) Identity and Access Management defines how users authenticate, what they can access, and how their actions are tracked. AAA Model
  • Authentication (A1):
    Proving identity, typically via passwords hashed with SHA or MD5 and compared to stored hashes.
  • Authorization (A2):
    Defines what actions or resources a user is allowed to access.
  • Accounting (A3):
    Logging and auditing user activity for accountability.
    Example: Windows event logs for login attempts.
Access Control Models
  • Discretionary Access Control (DAC):
    Users can manage permissions for their own resources (less strict).
  • Mandatory Access Control (MAC):
    Centralized, classification-based access rules (e.g., “Top Secret”).
III. Secure Network Protocols Older protocols often send credentials in plain text and must be avoided. Secure versions provide encryption and integrity.Insecure Protocol (Avoid)Secure Alternative (Use)ReasonHTTPHTTPS (TLS 1.2+)Plain text can be sniffed; TLS encrypts traffic. SSL is outdated.FTPSFTPSFTP uses SSH for secure file transfers.TelnetSSH v2SSH provides encrypted remote administration.POP3 / IMAPPOP3S / IMAPSSecures email retrieval.SNMP v1/v2SNMP v3Adds encryption for management traffic.

IV. IP Addressing: IPv4 and IPv6 IPv4
  • Introduced in 1983
  • Uses 32-bit dotted decimal notation (e.g., 192.168.1.1)
  • Address space nearly exhausted
Address Classes A, B, C for general use (D and E reserved). NAT (Network Address Translation) Used to conserve IPs by translating internal private IPs (RFC 1918 ranges) into a single public address:
  • 10.x.x.x
  • 172.16–31.x.x
  • 192.168.x.x
IPv6
  • Introduced in 1996
  • Uses 128-bit hexadecimal notation
  • Virtually unlimited address space → no need for NAT
Communication Modes
  • Unicast: One-to-one
  • Multicast: One-to-many
  • Anycast: One-to-nearest node among many
Adoption remains slow (~20% globally).

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cybercode_academy
...more
View all episodesView all episodes
Download on the App Store

CyberCode AcademyBy CyberCode Academy