System Architecture Basic Network Security & Security Vulnerabilities Attacks on Different Layers Authentication Security on Different Layers Network Attack Models Authentication Advantages Problems DoS and D-DoS Firewall Intrusion Detection Systems Security Management Conclusion