chapter 3 Flashcards
OSI model Layer 1:
Please Do Not Throw Sausage Pizza Away!
Layer 1: Physical is all about the basic equipment of networking: copper wires, fiber optic cables, and radio waves.
OSI model Layer 2:
Please Do Not Throw Sausage Pizza Away!
Layer 2: Data Link is where network switches reside. It formats data into data frames and routes it between systems on the local network using their media access control (MAC) addresses.
OSI model Layer 3:
Please Do Not Throw Sausage Pizza Away!
Layer 3: Network introduces IP addresses. At this layer, routers use IP addresses to send information between systems that are not located on the same local network. The Internet Protocol (IP) is the primary protocol used at this layer.
OSI model Layer 4:
Please Do Not Throw Sausage Pizza Away!
Layer 4: Transport
provides end-to-end communication services for applications. The Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) exist at this layer.
OSI model Layer 5
Please Do Not Throw Sausage Pizza Away!
Layer 5: Session
establishes, manages, and terminates sessions between applications running on different devices, allowing them to communicate and exchange data.
OSI model Layer 6
Please Do Not Throw Sausage Pizza Away!
Layer 6: Presentation translates data into a standard format that can be understood by the application layer, and provides encryption, compression, and other data transformation services.
OSI model Layer 7
Layer 7: Application provides network services to applications, allowing them to communicate with other applications over the network.
UDP
User Datagram Protocol provides connectionless sessions (without a three-way handshake). Used for DOS attacks
default port for HTTP
80
TCP
Transmission Control Protocol
3 way handshake .
1. Client sends syn
2. Server responds syn/ack
3. client responds ack
ICMP
Internet Control Message Protocol includes ping and tracert.
Used for Dos attacks, block ICMP at firewalls and routers,
ARP
Address Resolution Protocol resolves IPv4 addresses to MAC addresses.
ARP poisoning use ARP packets to give clients false hardware address updates,
FTP
File Transfer Protocol (FTP) uploads and downloads files cleartext, making it easy for an attacker to capture
TFTP
Trivial File Transfer Protocol is used to transfer smaller amounts of data, such as when communicating with network devices. Many attacks have used TFTP, but it is not an essential protocol on most networks. Because of this, administrators commonly disable it.
SSL
Secure Socket Layer: SSL has been compromised and is not recommended for use.
TLS
Transport Layer Security is the designated replacement for SSL and should be used instead of SSL for browsers using HTTPS. encrypts many protocals includes HTTPS.
IPsec
Internet Protocol Security is used to encrypt IP traffic.
SSH ports
Encrypts traffic in transit and can be used to encrypt other protocols such as FTP. Port 22
SCP
Secure Copy is based on SSH and is used to copy encrypted files over a network.
SFTP ports
is a secure implementation of FTP. It is an extension of Secure Shell (SSH) using SSH to transmit the files in an encrypted format. SFTP transmits data using TCP port 22.
SSL Versus TLS
SSL is not secure. Replaced by TLS
FTPS
Remember This! Secure Shell (SSH) encrypts traffic over TCP port 22 and is used to transfer encrypted files over a network. Transport Layer Security (TLS) is a replacement for SSL and is used to encrypt many different protocols, including browser-based connections using HTTPS. Secure FTP (SFTP) uses SSH to encrypt traffic. FTP Secure (FTPS) uses TLS to encrypt traffic.
FTP Secure uses TLS to encrypt traffic.
SMTP ports
Simple Mail Transfer Protocol port 25 for unencrypted email
transfers email between clients and SMTP servers. Originally, SMTP used TCP port 25 for unencrypted email.
The secure version, Simple Mail Transfer Protocol Secure (SMTPS) adds TLS encryption and uses TCP port 587.
POP3 ports
Post Office Protocol transfers emails from servers to end users. POP3 used TCP port 110 for unencrypted connections. The secure version of POP3 has the same name, but uses TCP port 995 for encrypted connections.