Chapter 10 Flashcards
Layer 7 Layer 6 Layer 5 Layer 4 Layer 3 Layer 2 Layer 1
7 Application-user interface
6 Presentation-Data format; encryption
5 Session-Process to process communication
4 Transport-End to end communication
3 Network-Routing data; logical addressing; WAN delivery
2 Data link-Physical Addressing, LAN delivery
1 Physical-Signaling
Wide area networks
Connect systems over a large geographic area
Local Area Networks
Provide network connectivity for computers located in the same geographic area
WAN connectivity options
Cable modem, DSL, fiber optics, satellite, dial up, cellular 3G and 4G networks
The Ethernet standard:
Defines the way that computers communicate on the network
Governs both the Physical and Data Link layers
Defines how computers use MAC addresses to communicate with each other on the network
Ethernet has become the most common LAN technology in use
Hubs
a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.
Switches
Perform intelligent filtering
“Know” the MAC address of the system connected to each port
When they receive a packet on the network, they look at the destination MAC address and send the packet only to the port where the destination system resides
Virtual LANs (VLANs)
is a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire, when in fact they are located on a number of different LAN segments
IPv4 addresses
Four-byte (32-bit) addresses that uniquely identify every device on the network
Still the most common
IPv6 addresses
Are 128 bits long
Provide more unique device addresses
Are more secure
Dynamic Host Configuration Protocol (DHCP)
is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network
Network port
a number that tells a receiving device where to send messages it receives
Internet Control Message Protocol (ICMP)
A management and control protocol for IP
Delivers messages between hosts about the health of the network
ICMP tools:
Ping sends a single packet to a target IP address (ICMP echo request)
Traceroute uses ICMP echo request packets to identify the path that packets travel through a network
Network Security Risks
Reconnaissance-
The act of gathering information about a network for use in a future attack
Eavesdropping-
When an attacker an attacker taps the data cable to see all data passing through it
Denial of service (DoS)-
Flooding a network with traffic and shutting down a single point of failure
Distributed DoS (DDoS) Uses multiple compromised systems to flood the network from many different directions
Telephony denial of service (TDoS)
Attempts to prevent telephone calls from being successfully initiated or received by some person or organization
Basic Network Security Defense Tools
Firewalls
Virtual private networks and remote access
Network access control (NAC)