CISSP Domain 4 · Teaching Web Page

Communication and Network Security

Protecting data in transit, securing network architectures, and applying protocols and controls to maintain confidentiality, integrity, and availability.

Domain introduction

This domain focuses on how systems communicate and how those communications are protected. It covers network architectures, protocols, segmentation, encryption in transit, and monitoring controls.

For ICT students, the key is understanding how data moves through networks and where controls such as firewalls, VPNs, and secure protocols should be applied.

Outcome 1

Understand layers

Explain OSI and TCP/IP models and where controls apply.

Outcome 2

Secure traffic

Use TLS, VPNs, and secure protocols to protect data in transit.

Outcome 3

Segment networks

Limit attack spread using segmentation and zoning.

Figures and mental models

Figure 1 — Network layers (simplified)

ApplicationHTTP, DNS, SMTP
TransportTCP, UDP, TLS
NetworkIP, routing
LinkEthernet, Wi‑Fi

Figure 2 — Secure data path

ClientUser device initiates request
TLSEncrypt channel
FirewallFilter traffic
AppProcess request
LogsMonitor & record

Case examples

Case 1 — Public web application

A company hosts a public website accessed globally.

  • Controls: HTTPS (TLS), WAF, load balancer, logging.
  • Design: DMZ, segmented internal network.
  • Question: What happens if TLS is misconfigured?

Case 2 — Remote workforce

Employees connect from home networks to internal systems.

  • Controls: VPN, MFA, endpoint checks.
  • Risk: insecure home networks.
  • Question: When is zero trust better than VPN?

Glossary — 50 core terms

#TermDefinition
1Network ArchitectureDesign of networks including devices, paths, protocols, and controls enabling secure communication.
2OSI ModelSeven-layer framework describing how data moves through networks from physical transmission to applications.
3TCP/IP ModelFour-layer model used on the internet defining data transmission and routing.
4Network ProtocolRules governing how devices communicate and exchange data.
5PacketSmall unit of data transmitted across networks and reassembled at destination.
6FirewallFilters network traffic based on rules to prevent unauthorized access.
7Packet FilteringFilters packets using headers like IP and port.
8Stateful FirewallTracks connections and filters traffic based on session state.
9Application FirewallInspects application-layer traffic for attacks.
10DMZNetwork zone for public-facing systems separated from internal network.
11SegmentationDividing networks to limit attack spread.
12IsolationSeparating systems to prevent unauthorized interaction.
13VPNEncrypted tunnel for secure remote access.
14Encryption in TransitProtecting data while traveling across networks.
15TLSProtocol securing communication with encryption and integrity.
16SSHSecure remote administration protocol.
17HTTPSHTTP over TLS providing secure web communication.
18DNSTranslates domain names to IP addresses.
19DNSSECAdds integrity and authenticity to DNS responses.
20NATMaps private addresses to public addresses.
21RoutingDetermining paths for packets across networks.
22RouterForwards packets between networks.
23SwitchConnects devices within a LAN.
24Load BalancerDistributes traffic across servers.
25ProxyIntermediary handling requests and filtering traffic.
26NACControls device access to networks.
27IDSDetects suspicious network activity.
28IPSBlocks malicious traffic automatically.
29MonitoringObserving network activity continuously.
30LoggingRecording network events for analysis.
31Wireless NetworkCommunication using radio signals instead of cables.
32Wireless EncryptionProtecting Wi‑Fi traffic with encryption.
33WPA3Modern Wi‑Fi security protocol.
34Wireless AuthenticationVerifying users/devices on Wi‑Fi.
35HardeningReducing attack surface through configuration.
36DPIInspecting packet contents for threats.
37PerimeterBoundary between trusted and untrusted networks.
38GatewayConnects networks and translates protocols.
39BandwidthMaximum data transmission capacity.
40LatencyDelay in network communication.
41MulticastSending data to multiple recipients efficiently.
42ReliabilityConsistent delivery of network services.
43AvailabilityEnsuring network services remain accessible.
44Traffic AnalysisExamining patterns for anomalies.
45Network ForensicsInvestigating traffic after incidents.
46Secure RoutingProtecting routing protocols.
47SDNCentralized software-based network control.
48InfrastructurePhysical and logical network components.
49Service AvailabilityEnsuring uptime of services.
50Secure CommunicationEnsuring confidentiality, integrity, and authenticity in data transmission.

Review questions

  1. Why is segmentation important for limiting attacks?
  2. What is the difference between IDS and IPS?
  3. Why is TLS critical for web security?
  4. What risks exist in wireless networks?
  5. How does zero trust change network design?