chap 5 - communication & network security Flashcards
define OSI 7-Layer model
- application –> data
- presentation –> data
- session –> Data
- transport –> Segments for end-to-end connection
- network –> Packets using the IP address
- data link -> frames using MAC address
- physical –> bites through cables
translate OSI to TCP/IP layers
- application + presentation + session –> application layer (Telnet/FTP/SMTP/DNS/RIP/SNMP)
- transport –> host to host transport (TCP/UDP)
- Network + data link –> internet layer (ARP/IP/IGMP/ICMP)
- data link + physical –> network interface layer (ethernet/token ring/ frame)
what are the step in cybersecurity kill chain
- reconnaissance
- weaponization
- delivery
- exploitation
- installation
- command & control
- actions on objectives
what are the different type of network topologies (physical layer)
- Bus -> central LAN cable to which all nodes connect advantage: adding is easy / node failure don’t affect network
disadvantage: if central LAN failure then entire network drop - Tree -> hierarchy of objects
advantage: adding is easy / node failure don’t affect network
disadvantage: if central LAN failure then entire network drop - Ring -> closed-loop with central point transmitted
advantage: use token - time stamp / used as LAN or network backbone
disadvantage: single point of failure (e.g., fiber distributed data interface (FDDI) use dual rings for failure) - Mesh -> mesh network connecting all nodes
advantage: high level of redundancy
disadvantage: expensive - star -> all nodes connected to a hub, switch or router (used in modern LAN)
advantage: fewer cable than mesh / easy to deploy
disadvantage: central connection is single point of failure
what is the role of a “carrier sense multiple access with collision detection (CSMA/CD)”
protocol allows devices to transmit data with minimum overhead, resulting in bandwidth efficiency
types of optical fiber cable
- single-mode: small diameter -> up to 100KM
- Multimode: large diameter -> up to 2KM
- plastic optical fiber (POF) -> up to 100m
what is a “modem”
“modulate” - “demodulate” devices used to modulate digital signals to analog wave and vis-versa
what are the types of digital subscriber lines (DSL)
- asymmetric DSL -> ADSL: downstream higher than upstream
- Rate-adaptive DSL -> RADSL: upstream based on quality line
- symmetric DSL -> SDSL: downstream & upstream are same
- Very high bite rate DSL -> VDSL high transmission (52mbps)
what is the role of a dynamic host configuration protocol (DHCP)
DHCP’s role is to assign IP address to devices
what OSI layer uses MAC address to redirect communications
Data link layer
what is Address Resolution Protocol (ARP)
used at the MAC layer to provide direct communication between 2 devices within the same LAN segment
what is a Point-to-point protocol (PPP) (PPPoE -> over Ethernet)
mechanism for establishing a layer 2 (data link) connection between 2 systems, e.g. internet service provider (ISP) and customer device
provides a standard method for transporting multiprotocol datagrams over point-to-point link
PPPoE: creates a virtual point to point connection
what is a Fibre channel over ethernet (FCoE)
provides a single layer 2 (data link) environment to manage
what is a contention-based protocol?
devices on network are competing for bandwidth, contention-based protocols are meant to avoid inference / collision:
- CSMA/CD: device on LAN that listen for a carrier before transmitting data
- Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): better for wireless environment -> avoid collisions by first checking the media is clear for transmission
what is a layer 2 “bridge”
device that filter traffic between segments based on MAC addresses. additionally they amplify signals
what is a switch
layer 2 switch establishes on collision domain per port, enabling more efficient transmissions with CSMA/CD logic within ethernet
what is a Virtual Local Area Network (VLAN)
VLANs allow admin to use switches to create software-based LAN segments, which can segregate or consolidate traffic across multiple switch ports
key threats to layer 2 (data link)
- MAC address spoofing
- MAC flooding -> DoS attack
- VLAN hopping -> 802.1Q attack
- Broadcast storms -> DoS attack
- Reconnaissance probes using MAC sniffing -> capture frames
key layer 2 (data link) counter measures to threats
- Proper NIC configuration
- Service monitoring (ARP/ DHCP)
- proper VLAN configuration
- proper switch port configuration
- Layer 2 IDS/IPS
what does layer 3 (network) uses to redirect communications
IP address
what are the 2 main goals of layer 3 (network)
- managing the logical addressing for networks
- forwarding packets to the correct logical network
what are the forms of transmission in layer 3 (network)
- Unicast -> 1-to-1 communication
- Broadcast -> one to many communication
- Multicast -> 1 host to a discrete group of host
- Anycast -> 1-to-1 transmission but uses services from group
- Geocast -> same as broadcast but restrictes destination of IP address geographically (think Netflix stream)
what are network layer protocols
- IPv4 provides a 32-bit address space
- IPv6 provides a 128-bit address space
Note: IPv4 and IPv6 use 2 different headers, therefore network cannot operate on both simultaneously
what are the 5 key network protocols and octet range
- class A -> 1-126 (subnet mask 255.0.0.0)
- class B -> 128-191 (subnet mask 255.255.0.0)
- class C -> 192-223 (subnet mask 255.255.255.0)
- class D -> 224-239 (subnet mask 255.255.255.255) -> for multi casting
- class E -> reserved for development & testing
what are the advantage of IPv6
- longer address field
- improved security
- improved QoS
what are routers most used for today
connect LAN to WAN
most basic security at layer 3 on router incl Access Control List (ACL) that approve/deny source and destination address. these routers are also called “boundary routers”, positioned on the DMZ
what are the 2 key meanings of Access Control List
routing: it is a table within a route’s memory that stores permitted
identity mgmt & access control: they are data structure that are usually keyed or indexed by user IDs and related those IDs to authorization information of various kind
what is the difference between routing protocol & routed protocol
Routing protocol: used by routers to communicate and coordinate with each other -> e.g., ICMP / IGMP
Routed protocols: define HOW data can be routed over a network. IPv4 and IPv6 are routed protocols
what protocol was created to increase WAN traffic efficiency (routing)
routing tables calculation for each packet use a lot of router computational resources creating latency.
“Multiprotocol label switching” (MPLS) is a WAN protocol design to increase WAN efficiency.
it operates on layer 2 (data link) and layer 3 (network)
what are the primary components of an MPLS network
- MPLS edge node
- label switching router (LSR)
- label switch path
what are the key advantages of MPLS
- traffic engineering
- multi-service network
- network resiliency
what are the key threats to layer 3 (network)
- routing (RIP) attack
- ICMP attack
- Ping flooding
- SMURF using
- IP address spoofing
- packet sniffing
what are the key countermeasures to protect layer 3 (network)
- SICMP
- properly config routers
- packet filtering and inspection -> NGFW
- router ACLs more effectively
- properly config VLAN
- layer 2 IDS/IPS
- zero trust architecture
- micro-segmenting LANs
what does layer 4 (transport) do
it delivers end-to-end services through segments transmitted in a stream of data and controls stream of data to relieve congestion
what are the 2 types of transport protocols (TCP/IP)
TCP - transmission control protocol - connection-oriented protocol -> provides packet sequencing
UDP - connectionless protocol -> does NOT support retransmission of packet
what are layer 4 protocols by group
- transport -> TCP UDP
- Names & directory services -> DNS / LDAP
- Network operational support & mgmt -> NTP / DHCP
- web page oriented -> HTTP / HTTPS
- email -> POP / IMAP SMTP
- admin & miscellaneous -> FTP / SSH / Telnet
how does TCP establish connection
using a three-way handshake
1a. SYNchronize
1b.SYN-ACKnowledge
2a. ACK
2b. Data ACK (using the connection…)
3a. FINish
3b. ACK + FINish
3c. ACK
what are the categories of TCP & UDP ports
- well-known ports -> 0-1023
- registered ports -> 1024-49151
- dynamic or private ports -> 49152-65535
primary use of 20/21
file transfer protocol -> FTP
primary use of 22
secure shell -> SSH
primary use of 23
Telnet