In a modern household, WiFi is often used exclusively, but sometimes network devices are also connected to a local network with Ethernet cables, and in this case switches or hubs are needed. In the current world, hubs are no longer widely used, but let's also familiarize ourselves with them a little, as they are interesting from a historical cybersecurity perspective.
Hubs
Hubs are simple network devices that act as traffic distributors. When a hub receives a data packet from one port, it sends it to all other ports. This means that all devices connected to the network receive the same message.
This poses an obvious challenge to cybersecurity. Since hubs forward all incoming data packets to all ports, devices on the network can intercept and read messages that are not intended for them. This is called network traffic monitoring or sniffing. Hubs, therefore, do not provide any protection or isolation between devices on the network.
Image: Wikipedia
Switches
Switches are more advanced network devices. The switch analyzes the MAC address of incoming data packets and determines which port they should be sent to. This enables sending targeted messages only to the correct recipient, reducing congestion and improving network performance. Switches also keep track of the MAC addresses and their locations in the network topology, which enhances network management. Switches also learn the location of new devices in the network based on data packets (i.e., the switch port behind which the device is found).
Switches are thus the solution to the security problems of hubs. Because switches send data packets only to targeted ports, they restrict the spread of messages throughout the network. This improves network security, as devices cannot intercept or read messages that are not intended for them. Or can they? We will revisit this in a future module.
Test your knowledge
What advantage do switches have compared to hubs in terms of data security?
Ready to become an ethical hacker?
Start today.
As a member of Hakatemia you get unlimited access to Hakatemia modules, exercises and tools, and you get access to the Hakatemia Discord channel where you can ask for help from both instructors and other Hakatemia members.