Domain 4 Flashcards
Open System Interconnections (OSI)
The Open System Interconnections (OSI) reference model was defined in 1984 and published as ISO/IEC 7498-1 The (OSI) reference model is structured into 7 layers: - Layer 7 - Application. - Layer 6 - Presentation. - Layer 5 - Session. - Layer 4 - Transport. - Layer 3 - Network. - Layer 2 - Data Link. - Layer 1 - Physical.
The TCP/IP Model
The TCP/IP Model (also known as the Department of Defence - DoD) reference model, is structured into four layers:
- Layer 1: Link Layer
- Layer 2: Internet Layer
- Layer 3: Transport Layer
- Layer 4: Application Layer.
Layers Characteristics
Layers reference specific functions.
- Layers provide Encapsulation
- Layers provide Abstraction
- Layers provide decoupling.
IP Convergence
IP Convergence is the use of the Internet Protocol (IP) for transmitting different types of traffic (e.g. voice, data, music, video, TC, teleconferencing) over single network.
- Introduces standardization.
- Reduces the number of service Providers.
- Reduces the number of service providers.
Non-IP Networking
TCP/IP is the communications protocol of the Internet. To transverse the Internet, non-IP networking protocols must either be encapsulated. translatable, or used for non-Internet niche purpose.
Multi-protocol Label Switching (MPLS)
Multi-protocol Label Switching (MPLS) is a scalable, protocol- independent transport technique for high performance networks.
- Operates between OSI Layers 2 and 3
- Data packets are assigned labels (tags)
- MPLS label edge routers (LER) make packet-forwarding decisions based on the short packet-label contents and quality of service (QoS) requirements.
Distributed Network Protocol (DNP3)
Distributed Network Protocol (DNP3) is an open standard-based communications protocol used between components in process automation systems.
- Operates at Layers 2, 4 and 7.
- Used primarily in the electric, water, waste water transportation, oil, and gas industries.
- DNP3 was developed to meet the need fro a standard protocol that would allow SCADA system components developed by differing vendors.
Fiber Channel over Ethernet (FCoE)
Fiber Channel over Ethernet (FCoE) is a Layer 2 standard-based protocol that allows Fibre Channel frames to be carried over Ethernet links.
- FCoE, network (IP), and storage (iSCSI) data traffic can be consolidated using a single network.
- FCoE is not routable at the IP layer.
Wireless Modes
- Ad Hoc: peer-to-peer relationship.
- Infrastructure Mode: topology includes wireless devices, access points, and wired routes connected to the Internet.
WPAN
Wireless Personal Area Network A.K.A Bluetooth. 802.15 Standard.
Interconnects devices within a limited range (e.g. keyboards)
WLAN
Wireless Local Area Network.
802.11 Standard
WMAN
Wireless Metropolitan Area Network.
802.16 Standard.
WWAN
Wireless Wan Area Network.
Point-to-Point microwave links.
802.11
Rate: 2 Mbps
Frequency: 2.4 GHz
Distance: 100m
802.11b
Rate: 11 Mbps
Frequency: 2.4 GHz
Distance: 140m
802.11a
Rate: 54 Mbps
Frequency: 5.0 GHz
Distance: 120m
802.11g
Rate: 54 Mbps
Frequency: 2.4 GHz
Distance: 140m
802.11n
Rate: 150 Mbps
Frequency: 2.4 GHz / 5.0 GHz
Distance: 250m
802.11i
Security for 802.11 technologies.
802.11e
Quality of Service (QoS) for priority and time sensitive data.
802.11 Security Protocols
- WEB
- WPA
- WPA2
WEP
- Authentication: Preshared key (PSK) or open.
- Key: 64- or 128-bit key . All users and services use the same key.
- Encryption: RC4 Stream Cipher
- Integrity: 32-bit CRC Hash
- Status: Insecure
WPA
- Authentication: Enterprise RADIUS, Certificate or Personal PSK
- Key: Separate keys (TKIP) 256-bit key
- Encryption: RC4 Stream Cipher
- Integrity: 64-bit MIC
- Status: Temporary Fix. Superseded by WPA2
WPA2
- Authentication: Enterprise RADIUS, Certificate or Personal PSK
- Key: Separate keys 256-bit key and block size.
- Encryption: AES Block Cipher
- Integrity: CCMP
- Status: Current standard Vulnerability if using Wi-Fi Protected Setup (WPS)
Wi-Fi Protected Setup
Created by the Wi-Fi alliance and introduced in 2006, the goal was to make it easy to add new devices to an existing network without entering long passphrases.
- The PIN flaw allows a remote attacker to recover the WPS PIN in a few hours with a brute-force attack and, with the WPS PIN, the networks WPA.WPA2 per-shared key .
War Driving
War Driving is the physical scanning for unprotected wireless networks.
War Chalking
War Chalking is marking a physical area to indicate a free, open, and/or insecure wireless network access point.
Bluejacking
Bluejacking - Bluetooth Discovery.
- Enables an attacker to send an unsolicited/unwanted message to a Bluetooth device.
Bluesnarfing
Bluesnarfing - Bluetooth Authentication.
- Discovering and connecting to a Bluetooth device with weak or non-existent authentication requirements.
Blueborne
Blueborne - Device Takeover
- Exploits protocol weakness.
NFC (Near Field Communication) Bump
NFC (Near Field Communication) Bump
- Enables an NFC-enabled attacker to connect to an NFC device by being in close enough range.
Evil Twin
Rogue access point with the same SSID,
- Enables an attacker to “trick” a user into connecting to a an attacker controlled network.
- May also impersonate a “captive portal” to capture credentials and/or payment information.
- Can be used as a stepping store to a MiTM attack
Transmission Characteristics.
- Throughput
- Signal Strength
- Environmental sensitivity (EMI and RFI)
- Temperature fluctuations.
- Interceptions capabilities (emanation)
Emanations Secuirty (EMSEC)
Attacker scan use radio signals, sounds, and vibrations, to obtain information. Protection mechanisms include shielding, filtering, and masking.
- Fiber optic has no electromagnetic protection standards.
TEMPEST
TEMPEST is a National Security Agency and NATO emanation certification program that includes both classified and unclassified protection standards.
Ethernet
Ethernet is defacto physical layer networking technology.
- Ethernet is a Carrier Sense Multiple Access / Collision Detection (CSMA/CD) Protocol.
- Current versions include Fast Ethernet (100 Mbps), Gigabit Ethernet (up to 100 Gbit/s) and Terabit Ethernet (above 100 Gbit/s).
Hubs
Hubs re-transmit a signal received on one connection point to all ports. Level 1 devices.
Repeaters
Repeaters amplify signals. Level 1 devices.
Bridges / Wireless Access Points
Bridges, Wireless Access Points filter traffic based on MAC address, amplify signals, and can connect dissimilar media.
Switch
Switches are used to create connections between two ports and eliminate collisions.
Routers
Routers forward packets using IP addresses and routing protocols.
Port Security
Port Security is a dynamic feature that can be used to limit and identify the MAC addresses of the stations that allow access to the same physical network.
Virtual Local Area Networks (VLAN)
Virtual Local Area Networks (VLAN) management allows for the software configuration of endpoints to be logically grouped together even if they are not attached to the same network switch.