SecurityCC

Network Security and Infrastructure Explained for ISC2 Certified in Cybersecurity (CC)

Attackers move through networks. Understanding how they move and what stops them is central to the CC exam's second and third domains. The CC exam does not test deep networking protocols, but it does test the security controls that work at each layer: firewalls, network segmentation, intrusion detection, secure protocols like HTTPS and VPNs, and why wireless networks require stronger authentication than wired ones. The physical security domain adds the controls that protect the buildings and rooms where servers and network equipment live.

7 min
3 sections · 7 exam key points

Network security controls

Firewalls filter network traffic based on rules. A packet filtering firewall examines individual packets (source IP, destination IP, port, protocol) and allows or blocks them based on static rules. A stateful inspection firewall tracks the state of active connections and makes filtering decisions based on context, not just individual packets. An application layer firewall (or next-generation firewall) inspects the content of traffic, not just headers, enabling it to detect threats embedded in legitimate protocols.

Network segmentation divides a network into isolated zones. A DMZ (Demilitarized Zone) is a semi-trusted segment that sits between the internet and the internal network, typically hosting servers that must be publicly accessible (web servers, email servers) without exposing the internal network. VLANs (Virtual Local Area Networks) segment traffic at the switch level, creating logical boundaries within a physical network. Segmentation limits how far an attacker can move once inside the network.

VPNs (Virtual Private Networks) encrypt network traffic over untrusted networks, allowing remote users or branch offices to access internal resources as if they were directly connected. Intrusion Detection Systems (IDS) monitor network traffic for signs of attack and generate alerts. Intrusion Prevention Systems (IPS) monitor and actively block detected attacks. The CC exam tests the IDS/IPS distinction: detection generates alerts, prevention takes action.

Physical security, encryption basics, and secure protocols

Physical security controls protect the hardware. Preventive controls stop unauthorized physical access: locks, key cards, security guards, mantraps (a small room with two doors where a person must be authenticated before the inner door opens). Detective controls identify when physical access has occurred: security cameras (CCTV), motion sensors, access logs. The principle of defense in depth applies physically: multiple barriers mean a single control failure does not compromise everything.

Encryption protects data confidentiality by transforming readable data into ciphertext. Symmetric encryption uses the same key to encrypt and decrypt (fast, used for bulk data). Asymmetric encryption uses a public key to encrypt and a private key to decrypt (slower, used for key exchange and digital signatures). HTTPS uses asymmetric encryption to exchange a symmetric session key, then encrypts the session traffic with that symmetric key. TLS (Transport Layer Security) is the protocol behind HTTPS.

Secure protocols replace insecure ones. HTTPS replaces HTTP (encrypted vs. unencrypted web traffic). SSH replaces Telnet (encrypted vs. unencrypted remote administration). SFTP replaces FTP (encrypted vs. unencrypted file transfer). The CC exam often presents pairs of secure and insecure protocols and asks which should be used to protect data in transit.

How to choose the correct answer

Firewall types: packet filtering (headers only), stateful (connection tracking), application layer (content inspection). Each catches what previous levels miss.

DMZ: publicly accessible servers between internet and internal network. Limits exposure of internal resources.

IDS: detects and alerts. IPS: detects and blocks. Both monitor traffic; IPS takes action.

VPN: encrypted tunnel over untrusted network. Used for remote access and site-to-site connections.

Mantrap (access control vestibule): two-door entry that prevents tailgating by requiring authentication before inner door opens.

Symmetric: same key for encrypt/decrypt (fast). Asymmetric: public/private key pair (slower, key exchange, signatures).

HTTPS = HTTP + TLS. SSH = encrypted Telnet. SFTP = encrypted FTP. Always use the encrypted version.

Key exam facts — CC

  • Packet filtering firewall: IP, port, protocol. Stateful: tracks connection state. NGFW: application-layer inspection.
  • DMZ: perimeter network hosting public-facing servers, isolated from internal network.
  • VPN: encrypted tunnel. IPsec for site-to-site. SSL/TLS for remote access (clientless).
  • IDS: passive monitor, alerts only. IPS: inline, can block traffic. IPS adds latency, IDS does not.
  • Physical controls: mantraps (prevent tailgating), CCTV, access logs, locks. Defense in depth applies physically.
  • Symmetric encryption: AES, 3DES. Asymmetric: RSA, ECC. HTTPS uses both: asymmetric for key exchange, symmetric for session.
  • Least privilege in network access: limit which systems can talk to which other systems using segmentation.

Common exam traps

A firewall completely prevents attacks from reaching internal systems.

Firewalls filter traffic based on rules, but attackers can bypass them in several ways: exploiting allowed ports (web applications on port 443 can carry malicious payloads), phishing that tricks internal users, or misconfigured rules. Defense in depth means using firewalls alongside IDS/IPS, endpoint protection, network segmentation, and application security to reduce risk from multiple angles.

IDS and IPS are just different names for the same tool.

An IDS is a passive monitoring tool that detects suspicious traffic and generates alerts for human review. An IPS is placed inline in the network traffic path and actively blocks traffic that matches threat signatures or anomaly thresholds. The key difference is action: IDS tells you about threats, IPS stops them. IPS adds potential for false positives to block legitimate traffic.

HTTPS means a website is safe and trustworthy.

HTTPS means the connection between your browser and the server is encrypted, protecting data in transit from eavesdropping. It does not mean the website itself is legitimate or trustworthy. Phishing sites, malware distribution sites, and fraudulent e-commerce sites frequently use valid HTTPS certificates. The lock icon indicates encryption, not authenticity of the site's purpose.

Practice this topic

Test yourself on CC Network Security

JT Exams routes you to questions in your exact weak areas — automatically, after every session.

No credit card · Cancel anytime

Related certification topics