Chapter 1 - Essential Knowledge (Introduction to Ethical Hacking) Flashcards
Match OSI Layers with PDU’s
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application - Data PDU
Presentation - Data PDU
Session - Data PDU
Transport - Segment PDU
Network - Packet PDU
Data Link - Frame PDU
Physical - Bit PDU
Acronym for top-down list of PDU’s
Do Sergeants Pay For Beer
Data Segment Packet Frame Bit
Match OSI Layers with Protocols Application
Presentation
Session
Transport
Network
Data Link
Physical
Application - FTP, SMTP, HTTP
Presentation - AFP, MIME, NCP
Session - X.225, SCP, ZIP
Transport - TCP, UDP
Network - IP
Data Link - ARP, CDP, PPP
Physical - USB Standards, Bluetooth, Etc
TCP/IP Model and Protocols
Application
Transport
Internet
Network Access
Application - HTTP, FTP, SNMP, DNS, POP, Telnet
Transport - TCP, UDP
Internet - IP, ICMP
Network Access - ARP, L2TP, STP, HDLC, FDDI
Match OSI Model to TCP/IP Model
Application
Presentation
Session
Transport
Network
Data Link
Physical
OSI Model — TCP/IP Model
Application - Application
Presentation - Application
Session - Application
Transport - Transport
Network - Internet
Data Link - Network Access
Physical - Network Access
Ethernet Frame Diagram
Three-Way Handshake
6 steps
- Host A send TCP SYN nchronize packet to B
- Host B receives the SYN
- Host B sends a SYNnchronize-ACKnowledge
- Host A receives the SYN-ACK from B
- Host A sends ACKnowledgement
- Host B receives the ACK from A
connection established
Ethernet Frames in Transit Diagram
ECC’s Five Network Zones
Internet
Internet DMZ
Production Network
Intranet
Management Network
- Internet
- Outside the boundary. Uncontrolled. No security policies applied
- Internet DMZ
- Controlled buffer network betwen you and the internet
- Production Network
- Very restricted zone that strictly controls access from uncontrolled zones. Does not hold users
- Intranet
- Controlled zone with little to no heavy restrictions. Not wide open but fewer strict controls
- Management Network
- Highly secured zone with very strict policies
Security, Functionality, Usability Triangle
Shows that as you move towards one corner, you get further from the other two
5 Sections of Threat Modeling
Identify Security Objectives
Application Overview
Decompose Application
Identify Threats
Identify Vulnerabilities
EISA
Enterprise Information Security Architecture
Collection of requirements and processes that help determine how organization’s information systems are built and how they work
Security Controls
- Physical
- guards, lights, cameras
- Technical
- encryption, smartcards, ACL’s
- Administrative
- training, awareness, policy efforts
Preventive, Detective, Corrective Measures
- Preventive
- authentication
- Detective
- alarm bells, alerts, for unauthorized access, audits
- Corrective
- backup and restore options
BIA
Business Impact Analysis
Identify systems and processes that are critical for operations.
includes measurements of the Maximum Tolerable Downtime (MTD) which lets you prioritize recovery of assets