This report covers major methodologies used to secure the network, threats that exist in network security, and countermeasures for network security. It discusses access control, authentication, integrity of data, availability, and non-repudiation of data. The report also covers various threats that spoil the confidentiality, integrity, and security of the network, and how to eliminate vulnerabilities by removing security holes in the network.