Domain 4: Communication and Network Security Flashcards
Name the Layers of the TCP/IP Model
- Application
- Transport
- Internet
- Network Access
Open standard primarily used within the energy sector for interoperability between various SCADA vendors’ and smart grid applications
Distributed Network Protocol (DNP3)
Storage networking that leverages Fibre Channel but is transmitted across standard ethernet networks
Fibre Channel over Ethernet (FCoE)
Storage network that leverages existing networking infrastructure and protocols to interface with storage
iSCSI
- iSCSI technology
- Provides a way of addressing storage across the network
Logical Unit Numbers (LUNs)
- Sends traffic over a radio band
- Uses a number of small frequency channels throughout the band and “hops” through them in pseudorandom order
Frequency-Hopping Spread Spectrum (FHSS)
- Sends traffic over a radio band
- Uses the entire band at once, “spreading” the signal throughout the band
Direct-Sequence Spread Spectrum (DSSS)
- Sends traffic over a radio band
- Allows simultaneous transmissions to use multiple independent wireless frequencies that do not interfere with each other
Orthogonal Frequency-Division Multiplexing (OFDM)
- Wireless Standard
- Top Speed: 2 Mbps
- Frequency: 2.4 GHz
802.11
- Wireless Standard
- Top Speed: 11 Mbps
- Frequency: 2.4 GHz
802.11b
- Wireless Standard
- Top Speed: 54 Mbps
- Frequency: 2.4 GHz
802.11g
- Wireless Standard
- Top Speed: 54 Mbps
- Frequency: 5 GHz
802.11a
- Wireless Standard
- Top Speed: 72-600 Mbps
- Frequency: 2.4 GHz / 5 GHz
802.11n
- Wireless Standard
- Top Speed: 422 Mbps - 1.3 Gbps
- Frequency: 5 GHz
802.11ac
- Wireless security standard
- Early attempt to provide 802.11 wireless security
- Weak new attacks can break key in minutes
WEP
- Wireless security standard
- Utilizes RSN which allows changes to cryptographic ciphers as new vulnerabilities are discovered
802.11i
- Wireless security standard
- Uses AES encryption for confidentiality
- CCMP for integrity
- aka RSN
WPA2
- Wireless security standard
- RC4 encryption for confidentiality
- TKIP for integrity
- Appropriate when AP lacks power to implement full standard
WPA
- 802.15 PAN wireless technology
- Operates in 2.4 GHz frequency
- Uses Frequency-Hopping Spread Spectrum (FHSS)
- Sensitive devices should disable automatic discovery by other devices
Bluetooth
How can a Bluetooth device be discovered?
- By guessing the MAC address
- First 24 bits are OUI easily guessed
- Last 24 bits can be determined via brute-force attack
Technology used to create wirelessly readable tags for animals or objects
RFID
What are the 3 types of RFID tags?
Active
Semi Passive
Passive
- RFID tag
- Have a battery
- Broadcast a signal
Active RFID tags
- RFID tag
- Have a battery
- Rely on RFID reader’s signal for power
Semi Passive RFID tags
- RFID tag
- Have no battery
- Rely on RFID reader’s signal for power
Passive RFID tags
Port-based network access control and includes extensible authentication protocol (EAP)
802.1X
- Provides authentication at layer 2 before a node receives an IP address
- Used both on wired and wireless networks
- Client called supplicant
EAP
- Type of EAP
- Cisco-proprietary alternative to TKIP for WAP
- Was developed to address deficiencies in TKIP before 802.11i/WPA2 was ratified as a standard
- Significant security flaws should not be used
LEAP
- Type of EAP
- Uses PKI requiring both server-side and client-side certificates
- Establishes a secure TLS tunnel used for authentication
EAP-TLS
- Type of EAP
- Drops the client-side certificate requirement allowing other authentication methods (i.e. passwords) for client-side authentication
EAP-TTLS
- Type of EAP
- Developed by Cisco, Microsoft and RSA
- Encapsulates EAP methods within a TLS tunnel that provides authentication and potentially encryption
- Does not require client-side certificates
PEAP
- Prevents collisions on a 802.11 wireless network
- Devices cannot send and receive data simultaneously
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
- Prevents collisions on a ethernet network
- Devices can send and receive data simultaneously
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
- Enables two 802.11 wireless clients to communicate with one another directly without an AP
- i.e. wireless printers, sharing files
Ad hoc mode
Wireless clients can only communicate with an AP, not with other clients
Client mode aka Managed mode
- Wireless clients use the AP to communicate with other clients
- Most commonly used 802.11 wireless mode
Infrastructure mode aka Master mode
- Encrypts only HTTP data, not the header allowing it to be sent over TCP port 80
- Uses DES or RC2 for encryption
- Supports asymmetric keys, but can be used with only symmetric keys
S-HTTP