IT 231: IT and Application
By the end of this chapter, you will be able to:
Network Security: The policies and practices adopted to protect a computer network and its resources.
The primary goals are to:
Think of a firewall as a digital gatekeeper for your network.
(Your Home or Office)
(The Internet)
A firewall stands between these two, inspecting all traffic.
A network security device that monitors incoming and outgoing traffic, allowing or blocking it based on a set of security rules.
It's like a security guard at a building entrance.
They can be software on your computer or dedicated hardware.
Often built directly into your Wi-Fi router (e.g., from WorldLink, Vianet).
Powerful, dedicated hardware devices protecting the entire campus network.
Software firewalls like Windows Defender or macOS Firewall protect your individual device.
A firewall protects the network, but what about the information traveling across it?
The process of converting readable data (plain text) into an unreadable, coded format (ciphertext).
Hello World ➡️ aJk8$Lp#wQ!z
The process of converting ciphertext back into plain text. This requires a secret key.
aJk8$Lp#wQ!z ➡️ Hello World
Encryption uses an algorithm and a key.
Analogy: The algorithm is the type of lock (e.g., a padlock). The key is the unique physical key that can open that specific lock.
When you use services like eSewa, Khalti, or Daraz, encryption protects your:
It ensures that even if a hacker intercepts the data, they cannot read or use it.
Any questions?
Next Up: Chapter 9 - Common Cybersecurity Threats