Domain 4 - Communications and Network Security Flashcards
OSI Model
PDNT SPA
Please Do Not Throw Away Sausage Pizzas
Physical Data Link Network Transport Session Presentation Application
Application Layer 7 Protocols
AFP CDP FTP GOPHER HTTP LDAP SNMP SMTP SMB TELNET TFTP
What protocols are used to encrypt HTTP documents?
Secure HTTP
S-HTTP
SSL, Secure Socket Layer
Eencryption technology to provide secure transactions like credit card numbers exchange.
Two layered: SSL record protocol and handshake protocol.
Same as SSH it uses symmetric encryption for private connections and asymmetric or public key cryptography for peer authentication.
Secure Electronic Transaction (SET)
authentication for credit card transactions. Overtaken by SSL
Also uses message authentication code for integrity checking.
Telnet
terminal emulation enables user to access resources on another machine. Port 23
FTP, File Transfer Protocol
for file transfers. Cannot execute remote files as programs. Authentication. Port 20 and 21
TFTP, Trivial File Transfer Protocol
stripped down, can only send/receive but not browse directories.
No authentication thus insecure. Port 6
SMTP, Simple Mail Transfer protocol
email queuing. Port 25
SNMP, Simple Networking Management Protocol
collection of network information by polling the devices from a management station.
Sends out alerts –called traps- to an database called Management Information Bases (MIBs)
Application Layer 7
C, AU, I, NR
The OSI model defines the application layer as the user interface responsible for displaying received information to the user.
Presentation Layer 6
C, AU, Encryption
Translations like EBCDIC/ANSI; compression/decompression and encryption/decryption.
Uses a common format to represent data, Standards
Presentation Layer 6 Protocols
JPEG,
TIFF,
MID,
HTML
Session Layer 5
Inter-host communication, logical persistent connection between peer hosts, a conversation, simplex, half duplex, full duplex
Session Layer Protocols
NSF, SQL, RADIUS, RPC. PAP, PPTP, RPC
Transport Layer 4
End-to-end data transfer services and reliability. Technology: Gateways. Segmentation, sequencing, and error checking at this layer.
Datagrams
TCP Three-way Handshake
SYN, SYN-/ACK, ACK
Transport Layer Protocols
TCP, UDP, SSL, SSH-2, SPX, NetBIOS, AT
Secure Shell (SSH-2
Authentication,
Compression,
Confidentiality
Integrity
Uses RSA certificates for authentication and triple DES for encryption
TCP, Transmission control protocol
reliable, sequences and works with acknowledgements.
Provides a manageable data flow to avoid congestions overloading and data loss.
(Like having a telephone conversation with someone). Connection Oriented.
UDP, User Datagram Protocol
unreliable, scaled down version of TCP, no error correction, no sequencing. Less overhead. (Like sending a letter to someone).
Connectionless.
Network Layer 3
C, AU, I
Path selection and logical/network addressing. Technology: Virtual circuits (ATM), routers.
Packets
Addressing
IP uses the destination IP to transmit packets thru networks until delivered
Fragmentation
IP will subdivide a packet if its size is greater than the maximum allowed on a local network