Domain 4 - Communications and Network Security Flashcards
OSI Model
PDNT SPA
Please Do Not Throw Away Sausage Pizzas
Physical Data Link Network Transport Session Presentation Application
Application Layer 7 Protocols
AFP CDP FTP GOPHER HTTP LDAP SNMP SMTP SMB TELNET TFTP
What protocols are used to encrypt HTTP documents?
Secure HTTP
S-HTTP
SSL, Secure Socket Layer
Eencryption technology to provide secure transactions like credit card numbers exchange.
Two layered: SSL record protocol and handshake protocol.
Same as SSH it uses symmetric encryption for private connections and asymmetric or public key cryptography for peer authentication.
Secure Electronic Transaction (SET)
authentication for credit card transactions. Overtaken by SSL
Also uses message authentication code for integrity checking.
Telnet
terminal emulation enables user to access resources on another machine. Port 23
FTP, File Transfer Protocol
for file transfers. Cannot execute remote files as programs. Authentication. Port 20 and 21
TFTP, Trivial File Transfer Protocol
stripped down, can only send/receive but not browse directories.
No authentication thus insecure. Port 6
SMTP, Simple Mail Transfer protocol
email queuing. Port 25
SNMP, Simple Networking Management Protocol
collection of network information by polling the devices from a management station.
Sends out alerts –called traps- to an database called Management Information Bases (MIBs)
Application Layer 7
C, AU, I, NR
The OSI model defines the application layer as the user interface responsible for displaying received information to the user.
Presentation Layer 6
C, AU, Encryption
Translations like EBCDIC/ANSI; compression/decompression and encryption/decryption.
Uses a common format to represent data, Standards
Presentation Layer 6 Protocols
JPEG,
TIFF,
MID,
HTML
Session Layer 5
Inter-host communication, logical persistent connection between peer hosts, a conversation, simplex, half duplex, full duplex
Session Layer Protocols
NSF, SQL, RADIUS, RPC. PAP, PPTP, RPC
Transport Layer 4
End-to-end data transfer services and reliability. Technology: Gateways. Segmentation, sequencing, and error checking at this layer.
Datagrams
TCP Three-way Handshake
SYN, SYN-/ACK, ACK
Transport Layer Protocols
TCP, UDP, SSL, SSH-2, SPX, NetBIOS, AT
Secure Shell (SSH-2
Authentication,
Compression,
Confidentiality
Integrity
Uses RSA certificates for authentication and triple DES for encryption
TCP, Transmission control protocol
reliable, sequences and works with acknowledgements.
Provides a manageable data flow to avoid congestions overloading and data loss.
(Like having a telephone conversation with someone). Connection Oriented.
UDP, User Datagram Protocol
unreliable, scaled down version of TCP, no error correction, no sequencing. Less overhead. (Like sending a letter to someone).
Connectionless.
Network Layer 3
C, AU, I
Path selection and logical/network addressing. Technology: Virtual circuits (ATM), routers.
Packets
Addressing
IP uses the destination IP to transmit packets thru networks until delivered
Fragmentation
IP will subdivide a packet if its size is greater than the maximum allowed on a local network
Network Layer 3 Protocols
IP, IPSEC, ICMP, BGP, OSPF, RIP, BOOTP, DHCP, ZIP, DDP, X.25, NAT IGMP
OSPF Open Shortest Path First
routing protocol short path
SKIP, Simple Key Management for Internet Protocols
provides high availability in encrypted sessions to protect against crashes. Exchanges keys on a session by session basis.
ARP, Address resolution protocol
Used to match an IP address to a hardware MAC address.
ARP sends out broadcast to a network node to reply with its hardware address.
It stores the address in a dynamic table for the duration of the session, so ARP requests are only sent the first time
ICMP, Internet control message protocol
sends messages between network nodes regarding the health of the network.
Also informs about rerouting in case of errors. Utility PING uses ICMP messages to check physical connectivity of the network machines IPX, Appletalk, and NetBEUI are non-IP protocols.
IP, Internet protocol
All hosts have an IP address.
Each data packet has an IP address of sender and recipient.
Routing in network is based upon these addresses.
Datagram service is considered unreliable because there’s no guarantee that the packet will be delivered, not even that its delivered only once and no guarantee that its delivered in the same sequence that its sent 32 bits long, IPv6 is 128 bits long
DHCP
Dynamic Host Configuration Protocol
BootP, Bootstrap Protocol
when wireless workstation is on-lined it sends out a BootP request with its MAC address to get an IP address and the file from which it should boot.
Replaced by DHCP
Data Link Layer 2
C
This layer deals with addressing physical hardware.
FRAMES Translates data into bits and formats them into data frames with destination header and source address. Error detection via checksums.
Switches, bridges, hardware addressing
LLC, the Logical Link Control
Sub layer - Flow control and error notification
MAC: the Media Access Control layer
Physical addressing. Concerns frames, logical topologies and MAC-addresses
Data Link Layer 2 Protocols
L2F, PPTP, L2TP, PPP, SLIP, ARP, RARP, SLARP, IARP, SNAP, BAP, CHAP, LCP, LZS, MLP, Frame Relay, Annex A, Annex D, HDLC, BPDU, LAPD, ISL, MAC, Ethernet, Token Ring, FDDI
RARP, Reverse address resolution protocol
When a hardware address is known but the IP address has to be found. (like an diskless machine)
Physical Layer 1
Physical signaling. Coverts bits into voltages or light impulses.
Electrical, Hardware and software drivers are on this level. It sends and receives bits.
Physical Layer 1 Devices?
Repeaters, hubs, cables, USB, DSL, SDN, ATM
What are the 4 layers of the TCP/IP Model?
NITA
Network access - Layer 1 (Data link, Physical). Routines for accessing physical networks and the electrical connection.
Internet – Layer 2 (corresponds to OSI network layer) Defines the IP datagram and handles routing
Host-to-Hotst Transport - – Layer 3 (Transport)
End-to-end data delivery Protocols: TCP and UDP
Application – layer 4 (Application/Presentation/Session) Applications and processes that uses the network
LPD, Line printer daemon
for printing and spooling
What are the Security Modes used in MAC?
Dedicated
Multi-Level
Controlled
Limited Access
Security Modes used in MAC: Dedicated
- All users can access all data.
- Clearance for all information.
- Need to know for ALL data system high security mode:
- All users can access some data, based on need to know
- Clearance for all information
- Need to know for SOME data compartmented security mode:
- All users can access some data, based on their need to know and approval.
- Clearance for all information they access - Need to know for SOME data
- Use of information labels
Security Modes used in MAC: Multi-level
- All users can access some data, based on their need to know, approval and clearance.
- Clearance for all information they access
- Need to know for SOME data
Security Modes used in MAC: controlled
type of multilevel security where a limited amount of trust is placed in the system’s hardware/software along with classification
Security Modes used in MAC: limited access
minimum user clearance is not cleared and the maximum data classification is unclassified but sensitive
What is a Firewall?
A method of guarding a private network by analyzing the data leaving and entering. Firewalls can also provide network address translation, so the IP addresses of computers inside the firewall stay hidden from view.
What are the different types of Firewalls?
Packet-filtering
Stateful packet filtering
Application Proxy
Circuit level proxy
Packet-filtering firewalls (layer 3/4)
use rules based on a packet’s source, destination, port or other basic information to determine whether or not to allow it into the network.
Stateful packet filtering firewalls (layer 7)
have access to information such as; conversation, look at state table and context of packets; from which to make their decisions.
Application Proxy firewalls (layer 7) (3-7 actually
which look at content and can involve authentication and encryption, can be more flexible and secure but also tend to be far slower.
Circuit level proxy (layer 5)-
looks at header of packet only, protects wide range of protocols and services than app-level proxy, but as detailed a level of control. Basically once the circuit is allowed all info is tunneled between the parties. Although firewalls are difficult to configure correctly, they are a critical component of network security
Wireless Protocols
IEEE 802.11 Wireless networking
IEEE 802.15 Bluetooth
IEEE 802.3 Ethernet
IEEE 802.20 LTE
802.11
2 Mbps
2.4 GHz
802.11a
54 Mbps
5 GHz
802.11b
11 Mbps
2.4 GHz
802.11g
54 Mbps
2.4 GHz
802.11n
200+ Mbps
2.4 or 5 GHz
802.11ac
1 Gbps
5 GHz
Telnet
Remote terminal access and Secure Telnet
SSH
Secure Shell over Telnet for remote server administration via the command line
Class A network
number values begin at 1 and end at 127
Class B network
number values begin at 128 and end at 191
Class C network
number values begin at 192 and end at 223
ISDN BRI
B-channel 64Kbps, D-channel 16Kbps
ISDN PRI
B- and D-channels are 64Kbps
Attenuation
a decrease in amplitude as a signal propagates along a transmission medium
Data backups
addresses availability, integrity and recovery but not confidentiality
IP headers
contain 32-bit addresses (in IPv4) and 128 in IPv6. In an Ethernet LAN, however, addresses for attached devices are 48 bits long.
TCP 21
FTP
TCP 22
SSH
TCP 23
Telnet
TCP 25
SMTP Mail
TCP 53
DNS
TCP 80
HTTP
TCP 143
IMAP
TCP 389
unsecured LDAP
TCP 636
LDAP-S over SSL or TLS
UDP 69
TFTP (Trivial FTP)
TCP/UDP 137-139
NetBIOS services
Switched Networks
Coaxial
Ethernet twisted pair
Fiber Distributed Data Interface
Frame Relay WAN
Coaxial
many workstations, length. 1000Base-T
– 100 M Twisted pair to long. Cat 5 better than cat3 for interference Fiber optics immune to EMI, can be broken and high cost/expertise Topology failures
Ethernet twisted pair
more resistant than coaxial Token Ring because a token is passed by every station, a NIC that’s is set to wrong speed or error can take all network down
Fiber Distributed Data Interface
form of token ring that has second ring that activates on error
Frame Relay WAN
over a public switched network. High Fault tolerance by relaying fault segments to working.
Speeds; T-1 – 1.544 Mbps, T-3 – 44,736 Mbps (45
ATM
ATM uses a connection-oriented model in which a virtual circuit must be established between two endpoints before the actual data exchange begins.
These virtual circuits may be “permanent”, i.e. dedicated connections that are usually preconfigured by the service provider, or “switched”, i.e. set up on a per-call basis using signalling and disconnected when the call is terminated.
155 Mbps, ISDN – 64 or 128 Mbps
CAT 3 UTP
10 Mbps
CAT 5
100 Mbps
CAT 5e/6
1,000 Mb
LDAP
Lightweight Directory Access Protocol, client/server based directory query protocol loosely based upon X.500, commonly manages user information, for accessing directory services and manage certificates Ex. Active Directory,
cn=ben+ou=sales Zero or more, comma separated, no semi-colon, + to join
SASL
provides secure LDAP authentication
OpenLDAP
default, stores user PW in the clear
Client SSL Certificates
used to identify clients to servers via SSL (client authentication)
S/MIME Certificates
used for signed and encrypted emails, can form sign, and use as part of a SSO solution
MOSS
MIME Object Security Services, provides authentication, confidentiality, integrity, and nonrepudiation
PEM
provides authentication, confidentiality, integrity, and nonrepudiation
DKIM
Domain Keys Identified Mail, domain validation tool
OAuth
Open Authorization
ability to access resources from another service
OpenID
paired with OAuth is a RESTful, JSON-based authentication protocol can provide identity verification and basic profile information, phishing attack possible by sending fake dat
Security Perimeter
The first line of protection between trusted and untrusted networks. Generally includes a firewall and router that help filter traffic.
May also include proxies, IDSs, and IPSs. Zero Day – application white list
Multiplexors
device that enables more than one signal to be send out of one physical circuit
WAN switches
multi-port networking devices that are used in carrier networks. Connect private data over public data by using digital signals.
Data link layer.
Access servers
server that provides dial-in and dial-out connections to the network
Modems
transmits data over telephone lines
Channel Service Unit (CSU)/Data service unit (DSU)
digital interface device used to terminate the physical interface on a DTE device. They connect to the closest telephone company switch in a central office (CO)