chap 5 - communication & network security Flashcards
define OSI 7-Layer model
- application –> data
- presentation –> data
- session –> Data
- transport –> Segments for end-to-end connection
- network –> Packets using the IP address
- data link -> frames using MAC address
- physical –> bites through cables
translate OSI to TCP/IP layers
- application + presentation + session –> application layer (Telnet/FTP/SMTP/DNS/RIP/SNMP)
- transport –> host to host transport (TCP/UDP)
- Network + data link –> internet layer (ARP/IP/IGMP/ICMP)
- data link + physical –> network interface layer (ethernet/token ring/ frame)
what are the step in cybersecurity kill chain
- reconnaissance
- weaponization
- delivery
- exploitation
- installation
- command & control
- actions on objectives
what are the different type of network topologies (physical layer)
- Bus -> central LAN cable to which all nodes connect advantage: adding is easy / node failure don’t affect network
disadvantage: if central LAN failure then entire network drop - Tree -> hierarchy of objects
advantage: adding is easy / node failure don’t affect network
disadvantage: if central LAN failure then entire network drop - Ring -> closed-loop with central point transmitted
advantage: use token - time stamp / used as LAN or network backbone
disadvantage: single point of failure (e.g., fiber distributed data interface (FDDI) use dual rings for failure) - Mesh -> mesh network connecting all nodes
advantage: high level of redundancy
disadvantage: expensive - star -> all nodes connected to a hub, switch or router (used in modern LAN)
advantage: fewer cable than mesh / easy to deploy
disadvantage: central connection is single point of failure
what is the role of a “carrier sense multiple access with collision detection (CSMA/CD)”
protocol allows devices to transmit data with minimum overhead, resulting in bandwidth efficiency
types of optical fiber cable
- single-mode: small diameter -> up to 100KM
- Multimode: large diameter -> up to 2KM
- plastic optical fiber (POF) -> up to 100m
what is a “modem”
“modulate” - “demodulate” devices used to modulate digital signals to analog wave and vis-versa
what are the types of digital subscriber lines (DSL)
- asymmetric DSL -> ADSL: downstream higher than upstream
- Rate-adaptive DSL -> RADSL: upstream based on quality line
- symmetric DSL -> SDSL: downstream & upstream are same
- Very high bite rate DSL -> VDSL high transmission (52mbps)
what is the role of a dynamic host configuration protocol (DHCP)
DHCP’s role is to assign IP address to devices
what OSI layer uses MAC address to redirect communications
Data link layer
what is Address Resolution Protocol (ARP)
used at the MAC layer to provide direct communication between 2 devices within the same LAN segment
what is a Point-to-point protocol (PPP) (PPPoE -> over Ethernet)
mechanism for establishing a layer 2 (data link) connection between 2 systems, e.g. internet service provider (ISP) and customer device
provides a standard method for transporting multiprotocol datagrams over point-to-point link
PPPoE: creates a virtual point to point connection
what is a Fibre channel over ethernet (FCoE)
provides a single layer 2 (data link) environment to manage
what is a contention-based protocol?
devices on network are competing for bandwidth, contention-based protocols are meant to avoid inference / collision:
- CSMA/CD: device on LAN that listen for a carrier before transmitting data
- Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): better for wireless environment -> avoid collisions by first checking the media is clear for transmission
what is a layer 2 “bridge”
device that filter traffic between segments based on MAC addresses. additionally they amplify signals
what is a switch
layer 2 switch establishes on collision domain per port, enabling more efficient transmissions with CSMA/CD logic within ethernet
what is a Virtual Local Area Network (VLAN)
VLANs allow admin to use switches to create software-based LAN segments, which can segregate or consolidate traffic across multiple switch ports
key threats to layer 2 (data link)
- MAC address spoofing
- MAC flooding -> DoS attack
- VLAN hopping -> 802.1Q attack
- Broadcast storms -> DoS attack
- Reconnaissance probes using MAC sniffing -> capture frames
key layer 2 (data link) counter measures to threats
- Proper NIC configuration
- Service monitoring (ARP/ DHCP)
- proper VLAN configuration
- proper switch port configuration
- Layer 2 IDS/IPS
what does layer 3 (network) uses to redirect communications
IP address
what are the 2 main goals of layer 3 (network)
- managing the logical addressing for networks
- forwarding packets to the correct logical network
what are the forms of transmission in layer 3 (network)
- Unicast -> 1-to-1 communication
- Broadcast -> one to many communication
- Multicast -> 1 host to a discrete group of host
- Anycast -> 1-to-1 transmission but uses services from group
- Geocast -> same as broadcast but restrictes destination of IP address geographically (think Netflix stream)
what are network layer protocols
- IPv4 provides a 32-bit address space
- IPv6 provides a 128-bit address space
Note: IPv4 and IPv6 use 2 different headers, therefore network cannot operate on both simultaneously
what are the 5 key network protocols and octet range
- class A -> 1-126 (subnet mask 255.0.0.0)
- class B -> 128-191 (subnet mask 255.255.0.0)
- class C -> 192-223 (subnet mask 255.255.255.0)
- class D -> 224-239 (subnet mask 255.255.255.255) -> for multi casting
- class E -> reserved for development & testing