Domain 4 -- Communication and Network Security Flashcards
What does the OSI Application Layer do?
The Application Layer does not provide Actual applications, but rather the protocols that support that applications.
The app layer works closest to the user and provides:
- file transmissions
- message exchanges
- Terminal sessions
- much more
What layer in the OSI Model is the Application Layer and what does it provide?
The application layer is layer 7 and it provides:
- File Transmissions
- Message Exchanges
- Terminal sessions
- And more
What does the OSI Presentation Layer do?
The presentation layer (Layer 6) receives information from the application layer and puts it in a format that any process operating at the same layer on a destination computer following the OSI model can understand.
It provides a common means of representing data in a structure that can be properly processed by the end system. (Think Tiff and JPEG)
Presentation layer also handles compression and encryption issues
Which layer is the Session Layer and what does it do?
- The Session Layer is Layer 5
- It is responsible for establishing communication between the two systems
- Think Telephone conversation
- Example protocols that work at this layer:
- Password Authentication Protocol (PAP)
- Point to Point Tunneling Protocol (PPTP)
- Network Basic Input output System (NetBIOS)
- Remote Procedure Call (RPC)
- Session layer has 3 modes
- Simplex
- Half duplex
- Full duplex
- Session layer protocols provide interprocess communication channels
- Session level protocols are the least used and only required within a network. Thus, firewall rules should shut them down.
What’s the difference between what happens at the Session Layer and what happens at the Transport Layer?
- The Session Layer protocols control Application to Application communication
- The Transport Layer protocols control computer to computer communication
What layer is the Transport Layer and what does it do?
- The transport layer is Layer 4
- When connection oriented protocols are used between two systems, they must go through a handshaking process and exchange parameters. This handshaking process happens at Layer 4
- The transport layer protocols are for systems, not applications
- The transport layer recieves data from many different applications and assembles the data into a stream to be properly transmitted over the network.
What layer in the OSI model is the Network Layer and what does it do?
- The Network layer is layer 3
- The main responsibilities of it are to:
- insert information into the packet’s header so it can be properly addressed and routed
- And then to actually route the packets to their proper destination
- Protocols at the network layer need to determine the best path for a packet to take to get to the destination
- Routing protocols build and maintain their routing tables
- Example Network Layer protocols:
- IP
- Internet Control Message Protocol
- Routing Information Protocol (RIP)
- Open Shortest Path First (OSPF)
- Border Gateway Protocol (BGP)
- Internet Group Management Protocol (IGMP)
What Layer of the OSI Model is the Data Link Layer and what does it do?
- The Data Link Layer is Layer 2
- It translates the packet into the LAN or WAN technology binary format for proper line transmission.
What are the two sub-layers in the data link layer?
- The Logical Link Control layer (LLC)
- The Network layer above communicates with the LLC layer. It does not know whether the underlying network is Ethernet, or ATM or ___________.
- It takes care of flow control and error checking
- Media Access Control
- The Media Access Control layer communicates with the physical layer
- It knows what the underlying network type is (Ethernet, etc.) and so addes the appropriate header/trailer records
Note –
What do the 802.XX specifications refer to? And where do they belong in the OSI stack?
The IEEE MAC spefications are:
- 802.3 - Ethernet
- 802.5 - Token Ring
- 802.11 - Wireless LAN
- Others
These protocols are at the MAC sublayer of the data link layer.
Give examples of protocols that work at the data link layer
- Point to Point Protocol (PPP)
- ATM
- Layer 2 Tunneling protocol (L2TP)
- FDDI
- Ethernet
- Token Ring
When the data link layer applies the last header and trailer to the data message, what is this called?
It is called framing.
The unit of data is called a frame.
What is the purpose of the physical layer? Which layer is it?
This layer controls synchronization, data rates, linie noise and transmission techniques.
Name the 7 layers of the OSI model in order from top to bottom.
All People Seem To Need Data Processing
- Application
- Presentation
- Session
- Transport
- Network
- Data Link
- Physical
Name Six Protocols That operate at the Application Layer
- File Transfer (FTP)
- Trivial File Transfer Protocol (TFPT)
- Simple Network Management Protocol (SNMP)
- Simple Mail Transfer Protocol (SMTP)
- Telnet
- Hypetext Transfer Protocol (HTTP)
Name the Presentation Layer Services
- Note that the Presentation Layer only has services, not protocols
- ASCII
- EBCDIC
- TIFF (Tagges Image File Format)
- Joint Photographic Experts Group (JPEG)
- MPEG
- MIDI
Name the Session Layer Protocols
It’s all about establishing connections between apps, dialog control, negotiation and tear down.
- NetBIOS
- Password Authentication Protocol (PAP)
- Point to Point Tunneling Protocol (PPTP)
- RPC (Remote procedure call)
Name the main purpose of the Transport Layer protocol and name some key protocols that operate at this layer
Transport layer protocols handle end-to-end transmission and segmentation of a data stream.
- TCP
- UDP
- SPX (Sequenced Packet Exchange)
Name the key purpose of Network Layer Protocols and give examples
The responsibilities of the network layer protocols include internetworking, addressing and routing.
- IP
- Internet Control Message protocol (ICMP)
- IGMP (Internet Group Management Protocol)
- Routing Information Protocol (RIP)
- Open Shortest Path First (OSPF)
- Internet Packet Exchange (IPX)
What is the purpose of protocols at the data link layer and give examples of.
These protocols convert data into LAN or WAN frames for transmission and define how a computer accesses a network. It’s divided into the Logical Link Control and MAC sublayers
- ARP
- RARP (Reverse ARP)
- PPP (Point to Point Protocol)
- Serial Line Internet Protocol (SLIP)
- Ethernet (IEEE 802.3)
- Token Ring (IEEE 802.5
- Wireless Ethernet (IEEE 802.3)
What does the physical layer do? Give examples of the interfaces that operate at this layer
Network interface cards and drivers convert signals and control the phscial aspects of data transmission, including optcal, electrical and mechanical requirements.
- RS422
- 10Base-T, 10-Base2, 10Base5, 100Base-TX, 100Base FX, 100Base-T, 1000Base-T, 1000Base-SX
- ISDN
- DLS
- SONET (Synchronous Optical Networking)
Which OSI layers can a computer process data on?
computers can access data at all of the 7 layers
What layer does a router operate at?
A router operates at the Network Layer (L3)
Name two types of devices that only understand up to the Data Link Layer1
Bridges and Switches
Name a devices that operates on the Physical (L1) layer
A repeater
What is a multilayer protocol?
Protocols that don’t fit neatly into the OSI Model?
What is the DNP3 Protocol?
- DNP3 stands for Distribruted Network Protocol 3
- It is an example of a 3 Layer protocol
- It is used in SCADA systems, particularly those in the power sector
- It does not support routing
- Does not include encryption or authentication (deverlopers thought it was only going to be a system of devices connected to each other (not the outside world)
- SCADA systems were eventually connected to the Internet
- No Intrusion Detection / Intrusion Detection
What is the Controller Area Network Bus?
- It stands for Controller Area Network
- It’s a multilayer protocol
- Runs on most automobiles worldwide
- Allows controllers and other embedded controllers to communicate via a shared buss
- Originally, the designers didn’t think security would be needed
- As cars started to get WiFi, new attack vectors emerged
- Jeep was hacked
What are the main components of TCP/IP
- IP is a connectionless network layer protocol that provides datagram routing services
- IP’s main task is to support internetwork addressing and packet routing
- There are two main protocols that function at the transport layer:
- TCP – reliable, connection-oriented protocol
- UDP – unreliable, connectionless protocol
If the Internet Protocol (IP) were to be compared to mailing a letter in the postal system, what would the three main components be?
- Data = Letter
- IP = Addressed Envelope
- Network = Postal System
What are the main characteristics of TCP?
- TCP is connection oriented, because a connection must first be established via handshaking
- By contrast, UDP is connectionless
- Both are transport protocols
- TCP and UDP both use ports to communicate with upper OSI layers
What are the three components of a socket?
The combination of the following make up a socket:
- Protocol (TCP or UDP)
- Port
- IP address
What are well-known ports and give examples
- Well-known ports are 0 - 1023 (Can only be used by privileged/root users)
- SMTP - 25
- FTP - 21, 20
- HTTP - 80
- Telnet - 23
- SNMP = 161, 162
*
What are the port ranges for
- Well Known Ports
- Registered Ports
- Dynamic ports
- Well Known ports: 0 - 1023
- Registered ports: 1024 - 49151
- Dynamic ports (49152 - 65535)
What are the three steps in the TCP handshake?
- SYN —>
- SYN/ACK <———
- ACK ——->
Give the names of units of transmission for the TCP/IP networking model
- Application Layer - Data
- Transport Layer - Segments
- Internetwork Layer - Packets
- Data Link Layer - Frames
- Physical layer - Bits
How many bits are used for IPv4 addressing?
How many bits are used for IPv6 addressing?
- IPv4 uses 32 bits for addressing
- IPv6 uses 128 bits for addressing
What is subnetting?
Subnetting allows larger IP ranges to be divided into smaller, logical, and more tangible network segments.
What is classful or classical IP addresses
This is used for traditional IP subnet masks.
What is CIDR and what does it do?
- CIDR stands for Classless Interdomain Routing
- Since Class B adddress ranges are usually too large and Class C are usually too small, CIDR provides the flexibility to increase or decrease the split between network address ranges and host address ranges
- CIDR is also referred to as supernetting
What are some of the key operational characteristics of the Internet Protocol (IP)?
- TTL (Time to Live) value to prevent packets from being retransmitted forever
- ToS (Type of Service) capability to enable prioritization
List 6 key benefits of IPV6 vs. IPV4
- Address size increased from 32 bits to 128 bits
- Scope field introduced for multicast addresses / anycast address
- Some IPV4 header fields have been dropped or made optional
- Changes in IP header options are encoded for more efficient forwarding
- Packet labeling for particular flows (e.g. QoS or real-time)
- Extensions to support authentication, data integrity and (optional) data confidentiality
Compare and Contrast MACsec with VPN?
- IEEE 802.1AE is the MACSec standard. It provides data confidentiality, data integrity and data origin authentication
- MACSec works with Ethernet LANs.
- VPN provides protection at higher levels in the stack
What does IEEE 802.1AR provide?
It provides a DEV-ID – a unique per device identifier, that can’t be easily spoofed.
Give 3 examples of Converged Protocols
- Fibre Channel over Ethernet (FCoE)
- Multiprotocol Label Switching (MPLS)
- Internet Small Computer System interface (iSCSI)
What is an example of IP Convergence?
IP Convergence is the transition of services from disparate transport media and protocols to IP.
Example: VoIP
What are the 3 broad types of transmission media?
- Electrical wires
- Optical fibers
- Free space
What’s the difference between bandwidth and Data Throughput?
What units are they measured in?
- Bandwidth is the number of electrical pulses that can be transmitted over a link in 1 second
- Throughput is the actual amount of data that can be carried over the connection
Data throughput can be higher than bandwith as a result of compression mechanisms
Both Bandwidth and Throughput are measured in bits/sec
Compare and Contrast Asynchronous and Synchronous Communications
Asynchronous
- No timing component
- Surrounds each byte with processing bits
- Parity bit used for error control
- Each byte requires three bits of instruction (start, stop, parity)
Synchronous
- Timing component for data transmission synchronization
- Robust error checking via CRC
- Used for high speed, high volume transmissions
- Minimal Overhead
Give examples of Broadband technologies
Broadband
- CATV coaxial cable
- DSL
- WiFi
Which is more secure, Fiber or Copper cabling? Why?
Fiber is more secure because it does not radiate signals and is therefore not susceptible to eavesdropping
What are the components of fiber optic communication?
Light sources
- LED’s
- Diode lasters
Cable
- Single mode - used for transmission over long distances, less susceptible to attenuation than multi-mode
- Multimode - Can carry more data because multiple frequencies are used. Better for short distances. More susceptible to attenuation
List three Cabling problems
- Noise
- Attenuation
- Cross Talk
What does spread spectrum mean with respect to wireless communications
Spread spectrum means using more than one frequency at a time.
What is frequency hopping spread spectrum?
First piece of data goes on one frequency
Next piece of data goes on a different frequency.
The idea is to help avoid collisions
What is Direct Sequence Spread Spectum (DSSS)?
It is a wireless communication approach that uses sub-bits
Sub bits are called chips.
Compare and Contrast FHSS and DSSS
- FHSS moves data by changing frequencies
- DSSS takes a different approach by applying sub-bits to a message and uses all of the availale frequencies at the same time
Where is Orthogonal Frequency Division Multiplexing (OFDM) used?
OFDM is used for:
- digital television
- audio broadcasting
- DSL broadband Internet access
- Wireless networks
- 4G Mobile communication
What is a Wireless AP and what does it do?
AP stands for wireless Access Point. It’s the device through which computers can access a WLAN
What are the three types of WLAN’s and briefly describe them
- An infrastructure WLAN is when more than one AP is used to extend an existing wired network
- An ad hoc WLAN has no AP’s. Each wireless device communicates directly with the others (peer to peer)
- Standard (km) where wireless devices go through an AP to get to the network
With respect to Wireless LAN’s, what is a channel?
A channel is a certain frequency range within a given frequency band.
AP’s are configured to communicate over a specific channel
What does SSID stand for and how is it used?
SSID stands for Service Set ID. Any hosts that wish to participate in a particular WLAN must be configured with the appropriate SSID.
A WLAN can be segmented into multiple SSID’s for the same reasons as using multiple wired network segments
What is a Basic Service Set (BSS)?
When wireless devices work in infrastructure mode, the AP and wireless clients form a group called a Basic Service Set (BSS).
Compare and contrast Open System Authentication (OSA) and Shared Key Authentication (SKA) of the 802.11 Wireless LAN standard
- OSA does not require the wireless device to prove it has a specific cryptographic key to allow for authentication purposes.
- Usually, just the SSID is needed
- All transactions are in cleartext
- With SKA (WEP), the AP sends a random value to the wireless device. The device encrypts it with its cryptographic key and returns it
- The AP decrypts it and if it matches the original random number, the device is authenticated
What are the three core deficiencies of WEP?
- The use of static encryption keys on all devices
- Ineffective use of Initialization vectors
- Usually the same IV used over and over
- Lack of packet integrity assurance
What does WEP stand for?
WEP stands for Wired Equivalency Privacy
What is 802.11i about and how did it improve upon WEP?
- 802.11i was introduced to address the security issues with WEP
- It provides for Wifi Protected Access II (WPA2)
- Before there was WPA2, there was WPA and it introduced:
- Temporal Key Integrity Protocol (TKIP)
- TKIP generates a new key for every frame that is transmitted
- TKIP addresses WEP deficiencies related to static keys and inadequate use of IV’s.
- WPA2 improves upon WPA by providing AES with CBC-MAC (Counter Mode, Cipher Block Chaining Message Authentication Code protocol)
Is 802.1X a wireless protocol?
No, it is an access control protocol that can be implemented on both wired and wireless networks
What’s the high level difference between the type of authentication provided by WEP and that provided by 802.1X?
- WEP provides system authentication
- 802.1X provides user authentication
What does EAP stand for and what is its main benefit with respect to wirelss security?
EAP stands for Extensible Authentication Protocol
It means the device has to authenticate to the Authenticator and the Authenticator has to authenticate to the device.
It prevents against a rogue AP attack.
What are the three main entities of 802.1X technology?
- Supplicant (Wireless Device)
- Authenticator (AP)
- Authentication Server (usually a RADIUS server
What authentication mechanisms are available via plug-ins with EAP?
- Passwords
- Tokens
- one-time passwords
- Certificates
- smart cards
- kerberos
At what layer of the OSI model does the 802.11 standard take place?
Data Link Layer.
The authentication protocols themselves operate at a higher level. So, there are many ways to use EAP.
What encryption algorithm are WEP and TKIP based on?
The RC4 algorithm – which is not a great fit.
What’s another name for WPA2?
Robust Security Network
What’s the Transfer rate, Frequency Range of the original 802.11 standard?
- 1-2MB
- 2.4GHz
What’s the Transfer rate, Frequency Range of the 802.11b standard?
- 11Mbps
- 2.4GHz
- DSSS
- Backward compatible with 802.11
What’s the Transfer rate, Frequency Range of the 802.11a standard?
- 54Mbps
- 5GHz (works in US, but not all other contries have allocated this band for wireless
- OFDM
What’s the contriubution of the 802.11e standard?
- Provided QoS support for multimedia traffic
What’s the contriubution of the 802.11f standard?
- 802.11f deals with conveying authentication informatino between AP’s so users can roam seamlessly
What’s the contriubution of the 802.11g standard?
- 802.11g provides up to 54Mbps
- still works in 2.4GHz spectrum
*
Which wireless frequencies have a wider range, 2.4 GHz or 5.0 GHz?
2.4 GHz
- What’s the contriubution of the 802.11h standard?
- It builds upon the 802.11a standard to meet European rules so 5.0 GHz devices can be used in Europe
What’s the contriubution of the 802.11j standard?
Its focus is interoperability where different countries have their own rules
What’s the contriubution of the 802.11n standard?
802.11n operates at 5.0GHz and can support throughput up to 100Mbps
- Uses MIMO (Multiple Input / Multiple Output)
- MIMO uses two input antennae and two output antennae
What’s the contriubution of the 802.11ac standard?
- It improves upon 802.11n
- 5GHz band
- Throughput up to 1.3GHz
- Support beamforming
- shaping of radio signals to improve performance in specific directions
- Better for high data rates at longer ranges than predecessor tech
What is the 802.16 Standard?
It’s the Metropolitan Area Network Standard.
A commercial implementation is WiMAX
What is the 802.15.4 standard for?
- 802.15.4 is a WPAN standard (Wireless Personal Area Network)
- 2.4GHz band
- ITO
- Wireless keyboards
- etc.
- Zigbee is a popular protocol based on 802.15.4
- ZigBee links operate at 250kbps
- 128 bit symmetrical key encryption
What’s the difference between Bluejacking and Bluesnarfing?
- Bluejacking is where someone sends an unsolicited message to a bluetooth device
- Often sends a business card
- The countermeasure is to put bluetooth device in non-discoverable mode
- Bluesnarfing is the unauthorized access from a wireless device through a bluetooth connection
- user can access calendar, contact list, emails and text and can copy pictures and private videos
What are best practices for securing a WLAN - Part 1?
- Change default SSID
- Implement WPA2
- Use separate VLAN for each class of user
- To support visitors, make sure they are on an untrusted network outside trusted perimeter
- Deploy a Wireless Intrusion Detection System (WIDS)
- Physically put the AP in the center of the building
- Logically, put the AP in the DMZ with a firewall between the DMZ and internal network
- Implement VPN for wireless devices to use
What are the best practices for securing WLAN’s - Part 2
- Configure MAC to only allow known MAC addresses to use it.
- Carry out penetration tests on the WLAN
What are the two main microwave wireless transmissions?
- Satellite (Ground to Orbiter to Ground)
- Terrestrial (Ground to Ground)
What are the four main types of mobile wireless technology?
- Frequency Division Multiple Access (FDMA)
- Time Division Multiple Access (TDMA)
- Code Division Multiple Access (CDMA)
- Orthogonal Frequency Division Multiple Access (OFDMA)
What are the main characteristics of Frequency Division Multiple Access (FDMA)?
- Earliest (1G)
- Frequency range divided into channels
- One channel per subscriber / exclusive control of the channel
What are the key characteristics of Time Division Multiple Access?
What are the key characteristics of Code Division Multiple Access (CDMA)
- CDMA assigns a unique code to each voice call or data transmission
- Calls are spread across the entire frequency band
- Every user can simultaneously use every channel
- A cell can simultaneously interact with multiple other cells
- This is the main technology in cellular today
What are the main characteristics of Orthogonal Frequency Division Multiple Access (OFDMA)?
- OFDMA is a combination of FDMA and TDMA
- Each channel is divided into a set of closely spaced orthogolan frequencies with narrow bandwidths (subchannels)
- Each of the different subchannels can transmit and receive simultaneously in a MIMO (Multiple Input Multiple Output) mode
- 4G requires OFDMA
What are the main characteristics of 1G mobile technology?
- analog transmission of voice-only data over circuit switched networks
- 19.2Kbps
What are the main characteristics of 2G mobile technology?
- Digitally encoded voice and data
- All of the following fall under the 2G umbrella:
- TDMA
- CDMA
- GSM
- PCS
- Supports data encryption, fax transmissions and SMS
What are the main characteristics of 3G mobile technology?
3G incorporates:
- FDMA
- TDMA,
- CDMA
- Packet switching (not circuit switching)
- Global roaming
- Internet services
- multimedia
- Reduced latency / faster speed
What are the main characteristics of 3.5G mobile technology?
- Higher data rates
- OFDMA technology
What are the main characteristics of 4G mobile technology?
- Based on all-IP packet-switched network
- Data exchange at 100Mbps to 1Gbps
At what layer of the OSI model do the various networking topologies reside (ring, bus, star, mesh)?
Layer 2
Name two technologies that use Token Passing?
Token Ring
FDDI