Firewall
• A Firewallis a network security device that monitors and filters incoming and
outgoing network traffic based on an organization's previously established
security policies. At its most basic, a firewall is essentially the barrier that sits
between a private internal network and the public Internet.
• It provide protection against outside cyber attackers by shielding your computer or
network from malicious or unnecessary network traffic. Firewalls can also prevent
malicious software from accessing a computer or network via the internet.
Firewall
Firewall is awall between a personal computer and the outside world. It will filter
the traffic coming from the outside world based on the user configuration like which
sites are trusted sites and which we need to allow.
• Block unsafe URLs.
• Close down a port completely.
• Open a port to only specific IP addresses.
• Allow some ip addresses at specific times.
Modem:
• What isa Modem?
• A Modem stands for Modulator–Demodulator.
• It converts:
• Digital signals → analog (for sending over telephone/cable lines)
• Analog signals → digital (for your computer to understand)
• It is the main device that connects your local network to the Internet through your ISP.
• Why Do We Need a Modem?
• ISP networks (cable, DSL, fiber) transmit signals differently than computers.
• A modem translates between both sides so communication becomes possible.
• Without a modem, devices cannot access the internet directly.
• Where is a Modem Used?
• Homes
• Offices
• Schools
7.
Types Of Modem:
•DSL Modem
Uses telephone lines for internet (separate frequency than voice calls).
• Cable Modem
Uses TV cable lines (coaxial cable), faster than DSL.
• Fiber Optic Modem (ONT)
Uses light signals through fiber cables; very high speed.
• Dial-up Modem
Old technology using telephone lines with very slow speeds.
• Wireless Modem (4G/5G Modem)
Uses cellular networks to provide internet.
Internet Protocols
• Whatis IP?
• IP (Internet Protocol) is the set of rules that control how data is addressed and routed across the
internet.
• Every device on a network has a unique IP address.
• Functions of IP
• Addressing: Identifies sender and receiver.
• Routing: Chooses the best path for data packets.
• Packetization: Splits data into small units called packets.
• Versions of IP
• IPv4:
• 32-bit address
• Format: 192.168.1.1
• Limited addresses
• IPv6:
• 128-bit address
• Format: 2001:0db8::1
• Supports more devices, better security
10.
DNS
• What isDNS?
• DNS translates domain names → IP addresses.
• Example:
google.com → 142.250.190.78
• Works like the internet’s phonebook.
• Why DNS is Needed
• Humans remember names, computers use numbers.
• DNS makes browsing easier and faster.
• Important DNS Records
• A Record: Maps domain → IPv4
• AAAA Record: Maps domain → IPv6
• MX Record: Handles email server routing
• CNAME: Alias of another domain
11.
HTTP
• What isHTTP?
• A protocol used for transferring web pages and online content.
• Based on request–response model:
• Browser → sends request
• Server → sends web page
• Features
• Stateless protocol
• Sends data in plain text
• Works on Port 80
• Limitations
• No encryption → vulnerable to:
• Man-in-the-middle attacks
• Data theft
12.
HTTPs
• What isHTTPS?
• HTTPS = HTTP + SSL/TLS Encryption
• Secures all communication between browser and server.
• Why HTTPS is Important
• Protects passwords, banking info, personal data
• Verifies website identity
• Prevents eavesdropping and tampering
• Shows lock icon in browser
• Technical Features
• Uses public/private key encryption
• Works on Port 443
13.
Email Protocols
• SMTP— Sending Emails
• SMTP (Simple Mail Transfer Protocol) is the protocol responsible for sending emails from your device to
the email server and then forwarding it to the receiver’s mail server.
When you click “Send,” your email app contacts the SMTP server, which works like a digital postman—it
takes the message, finds the correct destination, and delivers it securely. SMTP also handles delivery errors
and retries if the recipient's server is temporarily unavailable.
Used for: Outgoing mail only
Ports: 25, 465 (SSL), 587 (TLS)
• POP3 — Downloading Emails (Receiver Side)
• POP3 (Post Office Protocol v3) is used to download emails from the server to a single device. After
downloading, emails are usually removed from the server, meaning the message now exists mainly on the
device where it was downloaded.
This is similar to collecting letters from a post office: once taken, they are no longer stored there. POP3 is
simple and works well when you only use one device for emails (like only a laptop).
Limitations: Emails do NOT sync across multiple devices; deleting on one device won’t reflect on others.
Ports: 110, 995 (secure)
14.
Email Protocols
• IMAP— Cloud-Based Email Access
• IMAP (Internet Message Access Protocol) allows you to view and manage emails directly on the
server without permanently downloading them. Your device loads a copy while the email stays
stored online.
Any action—read, delete, move folders—updates on all devices, making it ideal for smartphones,
laptops, and tablets. This is why almost all modern services like Gmail and Outlook use IMAP by
default.
Best for: multi-device usage, cloud syncing
Ports: 143, 993 (secure)
15.
Introduction to modernnetworking
• Modern networking focuses on connecting devices, data, and services in smarter and
faster ways. It supports technologies like IoT, cloud computing, edge computing, and 5G
to enable real-time communication at massive scale.
Today’s networks aim to provide:
• High speed and low latency
• Massive device connectivity
• Remote access to data and applications
• Automation and smart environments
These technologies together shape smart homes, smart cities, advanced healthcare, and
intelligent industries.
16.
IOT(Internet of Things)
•The Internet of Things refers to a network of everyday physical devices, embedded with sensors
and connectivity, allowing them to collect, exchange, and act on data.
Examples include smart watches, home automation systems, connected cars, factory machines,
and health monitoring devices.
IoT devices gather real-time information and send it to cloud or edge systems for processing. This
brings benefits like automation, predictive maintenance, energy savings, and remote control. IoT is
the foundation behind smart homes, smart cities, and industrial automation.
17.
Cloud Computing
• Cloudcomputing provides computing power, storage, databases, and applications over
the internet, instead of local hardware.
It offers:
• Scalability: resources increase or decrease based on demand
• Cost efficiency: pay for what you use
• Accessibility: access data from anywhere
There are three main service models:
• IaaS (Infrastructure): virtual machines, servers
• PaaS (Platform): environment for developers
• SaaS (Software): ready-to-use apps like Gmail or Office365
Cloud plays a key role in storing IoT data, hosting apps, and enabling remote services.
18.
Edge Computing
• Edgecomputing processes data near the source (device or sensor) instead of sending everything
to the cloud.
This reduces:
• Latency (response time)
• Bandwidth usage
• Network congestion
Edge computing is essential in systems that need instant decisions, such as self-driving cars,
smart factories, medical monitoring devices, and security cameras.
It works together with cloud computing—edge handles real-time tasks, while cloud manages long-
term storage and analytics.
19.
5G
• 5G isthe fifth generation of mobile network technology, designed for extremely fast
communication and support for millions of devices.
Key features include:
• High speed: up to 100x faster than 4G
• Ultra-low latency: crucial for real-time applications
• Massive IoT support: connects thousands of sensors in one area
5G enables technologies such as smart transportation, AR/VR, remote surgery, autonomous
drones, and next-generation IoT systems.
Together with cloud and edge computing, 5G forms the backbone of modern smart ecosystems.
20.
Cybersecurity
• Cybersecurity isthe practice of protecting computers, networks, data, and systems from
unauthorized access, attacks, or damage. As our world becomes more digital, threats
continue to grow. Cybersecurity ensures confidentiality, integrity, and availability of
information. It includes technologies, policies, and practices that protect both individuals
and organizations.
• Cybersecurity protects sensitive information like passwords, banking data, personal
details, and business records. A single attack can lead to financial loss, identity theft,
system shutdowns, and damage to reputation. With the rise of online banking, remote
work, cloud services, and IoT devices, cybersecurity has become essential for safe digital
communication.
21.
Types of cybersecuritythreats
• Cyber threats are harmful activities designed to steal, damage, or disrupt data and
systems. Common threats include hacking, phishing, ransomware, identity theft,
insider attacks, and denial-of-service attacks. Threats can come from criminals,
hackers, employees, or automated bots. Understanding these threats helps in
building strong defenses.
22.
Malware
Malware, or malicioussoftware, is any program or file that's intentionally harmful
to a computer.
Any intrusive software developed by cybercriminals (often called hackers) to steal
and damage data or destroy computer systems. Examples of common malware
include viruses, worms, Trojan viruses, spyware, adware, and ransomware.
Virus
A computer virus is a type of malicious software, or malware, that spreads between
computers and causes damage to data and software. Computer viruses aim to disrupt
systems, cause major operational issues, and result in data loss and leakage.
23.
Worm
A computer wormis a type of malware that can automatically propagate or self-
replicate without human interaction, enabling its spread to other computers across a
network. A worm often uses the victim organization's internet or a local area
network (LAN) connection to spread itself.
• Morris Worm. At around 8:30 p.m. on November 2, 1988, a maliciously clever
program was released on the Internet from a computer at (MIT). This cyber worm
was soon propagating at remarkable speed and grinding computers to a halt.
24.
Spyware
Spyware is malicioussoftware that enters a user's computer, gathers data from the device and
user, and sends it to third parties without their consent. A commonly accepted spyware definition
is a strand of malware designed to access and damage a device without the user's consent.
Phishing
A technique for attempting to acquire sensitive data, such as bank account numbers, through a
fraudulent solicitation in email or on a web site, in which hacker pretendant to be as a legitimate
business or reputable person.
Spoofing
Spoofing is a type of cybercriminal activity where someone or something forges the
sender's information and pretends to be a legitimate source, business, colleague, or other
trusted contact for the purpose of gaining access to personal information, acquiring
money, spreading malware, or stealing data
25.
How Firewalls ProtectAgainst Malware
Firewalls act as a protective barrier between your system and the internet. They
block harmful activity before it reaches your device. Firewalls filter all incoming
and outgoing traffic and stop anything suspicious or unauthorized. They prevent
malware from entering the system by blocking harmful websites, closing unsafe
network ports, and stopping hackers from accessing your device. Firewalls also
prevent malware from spreading across a network and stop infected programs from
communicating with attacker servers. By monitoring and controlling traffic,
firewalls reduce the risk of viruses, worms, Trojans, spyware, and ransomware from
causing damage.