Managing Network Security and Risk Flashcards
What is Threat Modelling?
Like with many projects, having a scope and model provides an end goal to work towards and allows team members to identify any potential problems on the way, coming up with contingency plans. The same applies for threat modelling, being able to identify potential threats to prevent them before they can occur. This has the same principle of being proactive, as opposed to reactive.
When should you employ Threat Modelling
Threat modelling would then be best employed as early as an optimum point would be after you gather the requirements of the system. Once the requirements have been identified, it would then be appropriate to identify any threats with the requirements or as a result of implementing them.
What is Layer 7 of the OSI Model
Layer 7 – Application
• Provides the software interface for users, including services such as e-mail and file transfer.
What is Layer 6 of the OSI Model
Layer 6 – Presentation
• Data is translated from machine code so that users (humans) can view and interpret the data.
• Encryption and decryption can take place while data is translated using secure sockets such as SSL. This provides data to be viewed on the application layer that is independent of data representation.
• Encapsulation is the process of inserting a message inside another message or form of encryption to transfer. The provides the message an extra layer of security should it be interrupted during transmission.
What is Layer 5 of the OSI Model
Layer 5 – Session
• Creates and manages sessions or connections between applications using the protocols between.
• Authentication and Authorisation can occur in this layer during the creation of a connection.
What is Layer 4 of the OSI Model
Layer 4 – Transport
• Provides the connection platform for transmission using protocols such as UDP and TCP, depending on the requirements.
What is Layer 3 of the OSI Model
Layer 3 – Network
10
• Defines how traffic is routed between network devices, using the functionality of routers that have protocols such as RIP and OSPF. A multilayer switch can provide routing functions that operates on this layer, such as when VLANs are required.
• ICMP is a protocol used by the ping command to locate a destination and retrieve information from it
What is Layer 2 of the OSI Model
Layer 2 – Data
• Provides transfer of raw data across the physical layer to the nodes.
• A layer 2 switch has the STP (Spanning Tree Protocol) to reroute from damaged nodes to redundant nodes in the case of a fault
• The MAC address and switch operate at this layer
What is Layer 1 of the OSI Model
Layer 1 – Physical
• Physical equipment such as cabling and a NIC (Network Interface Card) are at this layer. The functionality of NIC would operate at Layer 2.
What is In Layer 7 of the OSI Model
HTTP, FTP, SMTP
What is In Layer 6 of the OSI Model
SSL, SSH, IMAP
What is In Layer 5 of the OSI Model
API’s, Sockets
What is In Layer 4 of the OSI Model
TCP, UDP
What is In Layer 3 of the OSI Model
Router, IP, ICMP, OSPF, RIP
What is In Layer 2 of the OSI Model
Switch, STP, 802.3, 802.11, 802.15