This report provides a comprehensive overview of network security, addressing various cyber threats and outlining effective protection strategies. It begins by identifying different types of scams and fraudulent activities prevalent on the internet, such as phishing, Nigerian scams, credit card scams, and identity theft. The report then delves into methods to protect computer networks from data theft, emphasizing the importance of up-to-date security software, strong passwords, and vigilance against public Wi-Fi vulnerabilities. It also explores browser security settings and the threats posed by different types of spyware and malware, including viruses, adware, and fake security software. The report further examines cybercrime legislation in New Zealand, specifically the Telecommunications Act 1987, the Harmful Digital Communications Bill, and the Crimes Act 1961, alongside preventive measures. It discusses Denial of Service (DoS) attacks, including TCP SYN Flooding and ICMP Smurf Flooding, and presents a network design protected against malware and DoS attacks, utilizing firewalls, routers, and IPS devices. Finally, the report reviews various software tools like Avast, AVAG, Malwarebytes, and Emsisoft, and discusses the different types of cryptography used to protect networks from attackers, including hash functions, public key cryptography, and secret key cryptography.