CISSP Domain 4 Flashcards
Communication and Network Security
OSI and TCP/IP Models Protocol types and security issues LAN, WAN, MAN, Intranet, and extranet technologies Cable types and data transmission types Network devices and services Communications security management Telecommunications devices and technologies Wireless technologies Network Encryption Threats and attacks Software defined routing Content distribution networks Multilayer protocols Convergent network technologies
Telecommunications
the electromagnetic transmission of data among systems
OSI Reference Model
ISO standard 7498 provides important guidelines used by vendors, engineers, developers, and others.
Encapsulation
Message moves down one stack and up another through the OSI model
Application Layer 7
works closest to the user and provides file transmissions, message exchanges, terminal sessions, and much more.
Does not include applications
passes instructions and data
Application Layer protocols
SMTP HRRP DNS IRC LDP
Presentation Layer 6
puts information in a format
common means of representing data in a structure
Presentation layer works as a
Translator.
Not concerned with the meaning of data,
but syntax and format
Presentation Layer formats
TIFF
GIF
JPEG
Compression
Presentation Layer handles
data compression and encryption
Only layer without protocols
Session Layer 5
Responsible for establishing a connection between two applications, maintaining it during the data transfer, and controlling the release of the connections.
Session Layer phases
Establish connection
data transfer
connection release
restart and connection if necessary
maintenance of the session.
Session Layer Protocols
Password Authentication Protocol (PAP)
Point to Point Tunneling Protocol (PPTP)
Network Basic Output System (NetBIOS)
Remote Procedure Call (RPC)
Session Layer modes
Simplex
Half Duplex
Full Duplex
difference between Session and Transport layers
Session is between 2 applications
Transport is between 2 computers
Security issue with RPC
lack of authentication or weak authentication
Session Layer protocols are
the least used in a network environment
Should be disabled
ATM
Asynchronous Transfer Mode
OSI Layers vs TCP/IP Layers
Application Application
Presentation
Session
___________________________________
Transport Host to Host
___________________________________
Network Internet
___________________________________
Data Link Network Access
Physical
Network Attacks can be
used as a channel for an attack
or
be the target of attack
Transport Layer 4
When 2 computers communicate
Handshaking process
Transport Layer provides
reliable data transfer error detection correction recovery flow control Optimization end to end data transport services establishes logical connection between two computers
Transport Layer Protocols
TCP Transport Control Protocol
UDP User Datagram Protocol
IPX
TCP vs UDP
connection vs best effort
Network Layer 3
inserts address and routing to packet’s header
Network Layer Protocols
IP Internet Protocol
ICMP Internet Control Message Protocol
RIP Routing Information Protocol
OSPF Open Shortest Path First
IGMP Internet Group Management Protocol
BGP Border Gateway Protocol
Data Link Layer 2
formats in order to transmit over Token ring ATM Ethernet ATM FDDI
Data Link sub layers
Logical Link Control LLC
Media Access Control MAC
Data Link LLC is defined in ISO
802-2
Flow control and Error checking
Ethernet is defined in ISO
802.3
Data Link MAC knows if the network is
Ethernet, Token Ring, or ATM
Token Ring is ISO is
802.5
Wireless LAN ISO is
802.11
Not to be confused with 802.1 for authentication
Data Link Protocols
Point to Point Protocol (PPP) ATM Layer 2 Tunneling Protocol (L2TP) FDDI Ethernet Token Ring
IEE 802 Layers
LLC
MAC
Network Cards bridge the
Data Link and Physical Layers
Data Link Layer unit of data
Frame
Physical Layer 1
converts bits into voltage for transmission
Physical Layer controls
Synchronization
Data rates
Line Noise
Transmission Techniques
Presentation Layer Standards
American Standard Code for Information Interchange (ASCII)
Extended Binary Coded Decimal Interchange Mode (EBCDOC)
Tagged Image File Format (TIFF)
Joint Photographic Experts Group (JPEG)
Motion Picture Experts Group (MPEG)
Musical Instrument Digital Interface (MIDI)
Bridges and Switches understand only up to the
Data Link Layer
Repeaters only understand traffic at the
Physical Layer
Layer 3 device works at the
Network Layer
Distributed Network Protocol 3
Designed for use in SCADA systems
Not a general purpose protocol
No routing functionality
SCADA systems
Hierarchical architecture
Sensors connected to Remote Terminal Units (RTUs)
RTUs aggregate data and relay to the SCADA master
Remote Terminal Unit
In Distributred Network Protocol 3, SCADA, the RTU relays information to the SCADA
Control instructions and configurations changes are sent from SCADA to RTUs
SCADA master
It the Human Machine Interface (HMI)
Controller Area Network Bus
Run most automobiles worldwide
TCP/IP: Model
IP is a network layer protocol and provides routing services
Main protocols of Transport Protocol
TCP and UDP
Socket
Is the combination of protocol (TCP or UDP), port, and IP address.
Well Known Ports
0-1023
Registered Ports
1024-49151
Dynamic Ports
49152-65535 available to be used by any application on an “as needed” basis
TCP Handshake
1 Syn
2 Syn//ACK
3. ACK
TCP must setup connection before any data is sent
SYN flood
SYN packets sent with never an ACK.
Floods system with SYN packets
Denial of Service attack
Syn Flood defenses
SYN caches
delays allocation of a socket until handshakes are complete.
Segment vs Datagram
TCP is segment
UDP is Datagram
IP 4 vs IP 6 bits
IP4 is 32 bit
IP6 is 128 bit
IP 4 Class Ranges
A is 0.0.0.0 to 127.255.255.255
First byte is network remaining for hosts
B is 128.0.0.0 to 191.255.255.255
First 2 bytes are network and the remaining are hosts
C is 192.0.0.0 to 223.255.255.255
First 3 are network and the last one is hosts
D is 224.0.0.0 to 239.255.255.255
Used for multicast addresses
E 240.0.0.0 to 255.255.255
Reserved for research
CIDR
Classless Interdomain Routing
Provides flexibility to increase of decrease class sized
TTL
Time to Live
Keeps packets from traversing a network forever
TOS
Type of Service
Prioritizes different packets
IP 6
Has IPSEC built in
allows scoped addresses
Does not require NAT
Teredo
Intersite Tunneling Mechanism using UDP encapsulation
ISATAP
Intrasite tunneling mechanism
Danger of Teredo
Attackers can use open ports for unintended traffic in and out of the network
802.1AR
MAC security standard (MACSec)
Provides a unique ID for a device
EAP-TLS digital certificate
Only communication over network is device authentication
MACsec
provides hop by hop protection at layer 2
Only authenticated and trusted devices on the network can communicate with each other.
EAP-TLS authentication framework
Each device compliant with 802.1AR comes with a built in device identifier (iDevID)
802.1AE
Provides data encryption, integrity, and origin authentication
802.1AF
Key agreement
carries out key agreement functions for the session keys used for data encryption
RADIUS
Remote Authentication Dial In Service
Authenticates devices by digital certificates using 802.1AR EAP-TLS
TPM
Trusted Platform Module
Converged Protocols
VOIP
FCoE
MPLS
ISCSI
FCoE
Fiber Channel over Ethernet
allows fiberchannel frames to ride on Ethernet
Mostly used in SAN storage
Not common
MPLS
Multiprotocol Label Switching
Frequently used to create Layer 2 VPNs
Called a layer 2.5 protocol
Data Link 2 and Network 3
Internet Small Computer System Interface
ISCSI
Encapsulates SCSI data to TCP segments
IP Convergence
addresses specific type of converged protocols
Transitions services from disparate media and protocols to IP
Baseband
One channel transmission
Broadband
Uses several channels
Analog vs Digital
Analog signals are measured in amplitude and frequency
Digital signals represent binary digits
ASTM
Asynchronous Transfer Mode
Data Link layer framed with start and stop indicators
Transfer data in a stream
Synchronous employs timing mechanisms
Asynchronous Communication Characteristics
No timing component Surrounds each bit with processing bits Parity bit used for error control Each byte requires three bits of instruction start stop parity
Synchronous Communication Characteristics
Timing component for data transmission synchronization
Robust error checking, commonly through
Cyclic Redundancy Checking (CRC)
Used for high speed, high volume transmissions
Minimal overhead compared to asynchronous communication
Coaxial Cable
copper core that is surrounded by a shielding layer and grounding wire.
more resistant to electromagnetic interference (EMI)
Attenuation
loss of signal strength as it travels
Cross Talk
signals of one wire spill over to the signals of another wire
Bus topology types
Linear
Tree
Star Topology
all nodes connect to a central device
Ethernet
Mesh Topology
multiple connection routes
MTU
Maximum Transmission Unit
How much data a frame can carry
Token Passing
24 bit control frame used to control which computers communicate.
Token is passed from computer to computer.
Only the computer with the token can put frames on the wire.
used by token ring and FDDI technologies
Do not have problems with collisions
CSMA
Used by ethernet
Carrier Sense Multiple Access with Collision Detection
Fasterthan token passing
Wireless uses
CSMA/Collision Avoidance
Each computer signals its intent to transmit data before it actually does so.
Signal collisions between 2 machines are detected by
increased voltage on the line
A collision domain is
a group of computers contending or competing for the same shared communication medium
Broadcast domains
are sets of computing nodes that all receive a layer 2 broadcast frame
Internetwork
When 2 distinct LANs are connected by a router
WAN
When 2 LANs are connected by a data link layer technology such as frame relay or ATM, they are a WAN
Ethernet is defined by
Contention based technology using a shared medium
Uses broadcast and collision domains
Uses CSMA CD or CA
Supports full duplex communication
Can use twisted pair, coaxal, or fiber optic cabling
Defined by standard IEEE 802.3
FDDI
developed by ANSI
usually used as a backbone using fiber optic cabling
provides fault tolerance by offering a second counter rotating ring
primary ring sends data clockwise
secondary ring transmits data counterclockwise and invoked only if the primary goes down
Each node is connected to both rings
FDDI 2
provides fixed bandwidth that can be allocated for specific applications
Copper Distributed Data Interface
CDDI can work over UTP cabling
IEEE 802.3 802.4 802.5
Ethernet is 802.3
FDDI is 802.4
Token ring is 802.5
IGMP
Internet Group Management Protocol
used to report multiport group membership to routers
When a user access multicast traffic, they become a member of a multi cast group.
Frame
Data that is not fully encapsulated
ARP
Address Resolution Protocol
When data link layer receives a frame, the network layer has already assigned a destination IP
ARP broadcasts a frame requesting the MAC address for the destination IP.