CISSP ch 12 Flashcards
PPP
Point-to-point Protocol,
An encapsulation protocol designed to support the transmission of IP traffic over dial-up or point-to-point links
Data link layer (layer 2) protocol that allows for multivendor interoperability of WAN devices supporting serial links
Rarely found on typical ethernet networks today
SLIP
Serial Line Internet Protocol (SLIP), replaced by PPP
offered no authentication, supported only half-duplex communications, no error detection, required manual link establishment and teardown
PPP communication services
Assignment and management of IP addresses
Management of synchronous communications
Standardized encryption
Multiplexing
Link configuration
Link quality testing
Error detection
Feature or option negotiation (such as compression)
PPP authentication options
PAP, CHAP, EAP and EAP derivatives
EAP derivatives
LEAP, PEAP, EAP-SIM, EAP-FAST, EAP-MD5, EAP-POTP, EAP-TLS, EAP-TTLS
PAP
Password Authentication Protocol
Transmits usernames and passwords in cleartext
Offers no encryption, simply transports logon credentials from the client to the authentication source
CHAP
Challenge Handshake Authentication Protocol
Based on MD5 and no longer considered secure
Performs authentication using a challenge-response dialogue that cannot be replayed
Challenge is a random number issued by the server, which the client uses along with the password hash to compute the one-way function derived response
Periodically reauthenticates
MS-CHAPv2 uses updated algorithms and is preferred over the original CHAP
EAP
Extensible Authentication Protocol
Framework for authentication, not an actual protocol
Allows customized authentication security solutions, such as supporting smartcards, tokens and biometrics
Originally designed for use of physically isolated channels / assumed secured pathways
Some EAP methods use encryption, others do not
LEAP
Lightweight Extensible Authentication Protocol
CISCO proprietary alternative to TKIP for WPA
Now a legacy solution to be avoided
PEAP
Protected Extensible Authentication Protocol
Encapsulates EAP in a TLS tunnel
Preferred to EAP
Support mutual authentication
EAP-SIM
EAP – Subscriber Identity Module
A means of authenticating mobile devices over the Global System for Mobile Communications (GSM) network
Uses each device/subscriber’s subscriber identity module (SIM) card
EAP-FAST
EAP – Flexible Authentication via Secure Tunneling
A Cisco protocol proposed to replace LEAP which is now obsolete, given the development of WPA2
EAP-MD5
Now deprecated
EAP-POTP
EAP – Protected One-Time Password
Supports the use of OTP tokens in multifactor authentication
EAP-TLS
EAP – Transport Layer Security
An open IETF standard that is an implementation of the TLS protocol for use in protecting authentication traffic
Most effective when both client and server have a digital certificate
EAP-TTLS
EAP – Tunneled Transport Layer Security
An extension of EAP-TLS that creates a VPN-like tunnel between endpoint prior to authentication
Ensures that even client’s username is never transmitted in cleartext
IEEE 802.1X
an authentication technology that can be used anywhere authentication is needed that Defines EAP
“Port Based Network Access Control”
QoS
Quality of Service
The oversight and management of the efficiency and performance of network communications
Items to measure:
Throughput rate
Bit rate
Packet loss
Latency
Jitter
Transmission delay
Availability
Throttling or shaping can be implemented on a protocol or IP basis to set maximum use or consumption limit
PTSN / POTS
Public Switched Telephone Network = plain old telephone service
PBX
Private branch exchange
A telephone switching or exchange system deployed in private organizations in order to enable multistation use of a small number of external PSTN lines
DISA
Type of telephony, Direct inward system access
Adds authentication requirements to all external connections to the PBX
Vishing
Voice based phishing
Phreakers
malicious attackers who abuse phone systems in much the same way that hackers abuse computer networks
VPC
Virtual private cloud
VDI
Virtual desktop interface
VMI
Virtual mobile interface
Remote access techniques
Service specific remote access
Remote control remote access
Remote node operation
Screen scraper/scraping
Service specific remote access
Gives users the ability to remotely connect to and manipulate or interact with a single service, such as email
Remote control remote access
Grants a remote user the ability to fully control another system that is physically distant from them
Remote node operation
When a remote client establishes a direct connection to a LAN, such as with wireless, VPN or dial-up connectivity
Remote system connects to a remote access server, which provides the remote client with network services and possible internet access
Screen scraper/scraping
Could refer to remote control, remote access or remote desktop services (virtual applications/desktops). The screen on the target machine is scraped and shown to the remote operator
Also a technology that allows an automated tool to interact with a human interface
Load balancing
obtaining more optimal infrastructure utilization, minimize response time, maximize throughput, reduce overloading and eliminate bottlenecks
Load balancer
used to spread or distribute network traffic in a variety of situations
Common implementation is spreading a load across multiple members of a server farm or cluster
Scheduling
load balancing methods = means by which a load balancer distributes the work, requests or loads among the devices behind it:
Random choice
Round robin
Load monitoring
Preferencing or weighted
Least connections/traffic/latency
Locality based (geographic)
Locality based (affinity)
Random choice (scheduling, load balancing)
Each packet or connection is assigned a destination randomly
Round robin (scheduling, load balancing)
Each pack or connection is assigned the next destination in order
Load monitoring (scheduling)
Each packet or connection is assigned a destination based on the current load of capacity of the targets
The device/path with the lowest current load receives the next packet or connection
Preferencing or weighted (scheduling, load balancing)
Each packet or connection is assigned a destination based on a subjective preference or known capacity difference
E.g., one system can handle twice the capacity of other systems
Least connections/traffic/latency (scheduling, load balancing)
Each packet or connection is assigned a destination based on the least number of active connections, traffic load or latency
Locality based (geographic) (scheduling, load balancing)
Each packet or connection is assigned a destination based on the destination’s relative distance from the load balancer
Used when cluster members are geographically separated or across numerous router hops
Locality based (affinity) (scheduling, load balancing)
Each packet or connection is assigned a destination based on previous connections from the same client, so subsequent requests go to the same destination to optimize continuity of service
TLS offloading
process of removing the TLS-based encryption from incoming traffic to relieve a web server of the processing burden of decrypting and/or encrypting traffic
Virtual IP addresses
Sometimes used in load balancing
When the IP address is not actually assigned to a physical machine – communications received at the IP address are distributed in a load-balancing schedule to the actual systems operating on some other set of IP addresses
Persistence / Affinity (load balancing)
when a session between a client and a member of a load-balanced cluster is established and subsequent communication from the same client are sent to the same server, thus supporting persistence or consistency of communications
Active-active system (load balancing)
a form of load balancing that uses all available pathways or systems during normal operations
Used when traffic levels or workload during normal operations need to be maximized, but reduced capacity will be tolerated during adverse conditions
active-passive system (load balancing)
a form of load balancing that keeps some pathways or systems in an unused dormant state during normal operations to that if one active element fails, then a passive element is brought online and takes over the workload
Used when the level of throughput or workload needs to be consistent between normal states and adverse conditions
Open relay agent or relay agent
an SMTP server that does not authenticate senders before accepting and relaying mail
Closet relays
authenticated relays = SMTP server that authenticates senders
S/MIME
Secure Multipurpose Internet Mail Extensions
An email security standard that offers authentication and confidentiality to email through public key encryption, digital envelopes and digital signatures
Authentication is provided by X.509 digital certificates issued by trusted third-party CAs (certificate authorities)
Privacy is provided through the use of Public Key Cryptography Standard (PKCS) compliant encryption
Signed message = provides integrity, sender authentication and nonrepudiation
Enveloped message = provides recipient authentication and confidentiality
PGP
Pretty good privacy
A peer-to-peer public-private key-based email system that uses a variety of encryption algorithms to encrypt files and email messages
Not a standard, but an independently developed product with wide support, elevating its proprietary certificates to de facto standard status