This document discusses network security over Ethernet. It provides information on various Ethernet technology standards such as 802.3, 802.11, and 802.16 and discusses their physical/logical characteristics and whether they use guided or unguided media. It also shows the security levels of various operating systems such as Windows, Linux, and their distributions. Furthermore, it discusses what information an intruder seeks outside an operating system, how attacks are performed through techniques like port scanning and covering tracks using rootkits.