Network Fundamentals

Kyambogo University, Kiwatule - Banda - Kyambogo Road, Kampala, 00256

Kyambogo University - Kampala, Uganda

Computer networks are everywhere, they've become part of us. Understanding network concepts plays a big role in protecting an individual from possible threats they could fall victim of. From denial of service attacks to repudiation attacks, various methods can be used to manipulate devices connected to a network. Join us as we learn and discuss more about computer networks.

Oct 24, 2023, 9:00 – 11:00 AM

18 RSVP'd


Key Themes

Career DevelopmentGoogle Cloud

About this event

Computer networks have indeed become an integral part of our daily lives, transforming the way we communicate, work, and interact with the world. Understanding the fundamental concepts of computer networks is crucial not only for professionals in the IT industry but also for individuals who use digital devices in their everyday lives. Let's delve a bit deeper into some of the key concepts and threats associated with computer networks.

1. Understanding Computer Networks:

Network Components: Networks consist of various components such as computers, servers, routers, switches, and cables. These components work together to facilitate the exchange of data and resources.

Protocols: Protocols are rules and standards that define how data is transmitted and received over a network. Common protocols include TCP/IP, HTTP, and FTP.

Types of Networks: Networks can be classified into LANs (Local Area Networks) and WANs (Wide Area Networks). LANs cover a small geographic area, like a single building, while WANs can cover large distances, connecting multiple LANs.

2. Common Network Threats:

Denial of Service (DoS) Attacks: These attacks overwhelm a network or website with traffic, making it unavailable to users.

Distributed Denial of Service (DDoS) Attacks: Similar to DoS attacks, but conducted using multiple devices, making them harder to mitigate.

Malware: Malicious software like viruses, worms, and ransomware can disrupt networks and compromise data.

Phishing: Attackers use deceptive emails or websites to trick users into revealing sensitive information such as passwords and credit card numbers.

Man-in-the-Middle (MitM) Attacks: Hackers intercept communication between two parties, allowing them to eavesdrop or modify the data being exchanged.

Data Interception and Theft: Attackers can intercept and steal data transmitted over a network, leading to data breaches.

3. Network Security Measures:

Firewalls: Firewalls monitor and control incoming and outgoing network traffic, acting as a barrier between a trusted network and untrusted networks.

Encryption: Encrypting data ensures that even if it's intercepted, it remains unreadable without the encryption key.

Regular Updates and Patch Management: Keeping software, operating systems, and antivirus programs up to date helps protect against known vulnerabilities.

Strong Authentication: Implementing multi-factor authentication adds an extra layer of security beyond just usernames and passwords.

Network Monitoring: Constantly monitoring network traffic helps detect unusual patterns or suspicious activities.

4. Importance of Education and Awareness:

User Training: Educating users about safe online practices and how to recognize phishing attempts can significantly reduce the risk of successful attacks.

Staying Informed: Given the evolving nature of cyber threats, staying informed about the latest security trends and best practices is crucial.



Tuesday, October 24, 2023
9:00 AM – 11:00 AM UTC


  • Christopher Amadra Titus

    Kyambogo University


  • Mr Robert Musoke

    Kyambogo University

    Lab Technician(Academics)

  • Musime Joet

    Kyambogo University




    GDSC Lead


    Owen Tech




    Android Lead

  • Namugarura Syda

    Lead Women In Tech

  • Hope Akol

    Information Technology Services

    Technical Lead

  • Muwanga Enock


    Membership Coordinator

  • Namutebi Sophia

    Event Lead

  • Davis Nsobya

    Network Lead

Contact Us