Network Security Fundamentals Flashcards
What are the layers in the Cisco three layer model?
The Cisco three-layer model, also known as the Cisco hierarchical network model, is a framework for designing scalable and reliable networks. It divides network infrastructure into three distinct layers, each with specific functions:
-
Core Layer:
- Function: The backbone of the network, responsible for high-speed and reliable data transport. The core layer ensures fast and efficient movement of large volumes of data between different parts of the network.
- Key Characteristics: High-speed switching, redundancy, and minimal latency. The core layer typically has a limited number of routing protocols and minimal filtering to maintain performance.
-
Distribution Layer:
- Function: Acts as an intermediary between the core and access layers. The distribution layer is responsible for routing, filtering, and managing network policies. It controls the flow of data between the access layer (where end devices connect) and the core layer.
- Key Characteristics: Policy enforcement, security filtering, VLAN management, and inter-VLAN routing. It often includes redundancy features and load balancing to maintain network stability.
-
Access Layer:
- Function: The layer where end devices, such as computers, printers, and IP phones, connect to the network. It facilitates user access to the network and provides network services like authentication.
- Key Characteristics: Port security, VLAN assignments, QoS (Quality of Service), and PoE (Power over Ethernet). The access layer focuses on providing connectivity and ensuring that devices are securely integrated into the network.
These three layers work together to create a scalable, manageable, and resilient network structure.
What are the stages in the TCP/IP stack?
The TCP/IP stack, also known as the TCP/IP model or Internet protocol suite, consists of four layers that correspond to the various stages of data transmission over a network:
-
Application Layer:
- Function: Provides network services directly to user applications. It handles high-level protocols and defines how applications communicate over the network.
- Key Protocols: HTTP, FTP, SMTP, DNS, and others.
-
Transport Layer:
- Function: Ensures reliable data transfer between devices. It manages the flow of data, error checking, and retransmissions.
- Key Protocols: TCP (for reliable communication) and UDP (for faster, less reliable communication).
-
Internet Layer:
- Function: Handles the logical addressing and routing of data packets across the network, ensuring they reach the correct destination.
- Key Protocols: IP (Internet Protocol), ICMP (Internet Control Message Protocol), and ARP (Address Resolution Protocol).
-
Network Interface (Link) Layer:
- Function: Manages the physical transmission of data over network hardware, such as cables and wireless signals. It handles the data link and physical layers of network communication.
- Key Protocols: Ethernet, Wi-Fi (IEEE 802.11), and other protocols related to hardware interfaces.
These layers work together to facilitate the transmission of data across networks, from high-level application communication down to the physical movement of data packets.
What are the layers in the OSI model?
The OSI (Open Systems Interconnection) model is a conceptual framework that standardises the functions of a telecommunication or computing system into seven distinct layers. Each layer serves a specific role in the process of network communication:
-
Physical Layer (Layer 1):
- Function: Handles the physical connection between devices, including the transmission of raw binary data over a physical medium (such as cables or wireless signals). It defines hardware elements like cables, switches, and network interface cards.
-
Data Link Layer (Layer 2):
- Function: Responsible for node-to-node data transfer and error detection/correction. It packages raw bits from the Physical Layer into frames and manages access to the physical medium.
- Key Protocols: Ethernet, PPP (Point-to-Point Protocol), MAC (Media Access Control).
-
Network Layer (Layer 3):
- Function: Manages logical addressing and routing of data packets across multiple networks. It determines the best path for data to travel from source to destination.
- Key Protocols: IP (Internet Protocol), ICMP (Internet Control Message Protocol).
-
Transport Layer (Layer 4):
- Function: Provides reliable data transfer between end systems, including error detection, data flow control, and retransmission of lost packets.
- Key Protocols: TCP (Transmission Control Protocol), UDP (User Datagram Protocol).
-
Session Layer (Layer 5):
- Function: Manages sessions or connections between applications, handling the opening, closing, and managing of communication sessions.
- Key Concepts: Session establishment, maintenance, and termination.
-
Presentation Layer (Layer 6):
- Function: Translates data between the application layer and the network format. It handles data encryption, compression, and formatting, ensuring that data is in a usable format.
- Key Concepts: Data translation, encryption, and compression.
-
Application Layer (Layer 7):
- Function: Provides network services directly to end-user applications. It is the layer closest to the user, where network interactions take place.
- Key Protocols: HTTP, FTP, SMTP, DNS, and many others.
These seven layers work together to facilitate communication between devices over a network, with each layer serving a distinct role in the process.
What are the two types of switches?
The two main types of switches in networking are:
-
Unmanaged Switches:
- Function: These switches are simple, plug-and-play devices that require no configuration. They automatically direct traffic between devices on the same network without any user intervention. Unmanaged switches are typically used in small networks or for basic connectivity purposes where advanced features and control are not needed.
-
Managed Switches:
- Function: Managed switches offer advanced features that allow for greater control and customisation of the network. These features include VLAN configuration, Quality of Service (QoS) settings, port mirroring, and remote management. Managed switches are used in larger or more complex networks where network performance, security, and monitoring are critical.
Both types of switches are essential in different networking scenarios, with unmanaged switches being more suitable for simple environments and managed switches for more complex, controlled, and scalable networks.
What are the main functions of a network router?
Path Determination:
- Function: A router’s primary function is path determination, where it builds and maintains a routing table. This table acts as a database of known networks and the routes to reach them. The router uses this information to determine the most efficient path for data packets to travel from the source to the destination across different networks.
Packet Forwarding:
- Function: Another key function of a router is packet forwarding. When a router receives a data packet on one of its interfaces, it consults its routing table to decide the best interface to forward the packet to, ensuring it reaches its intended destination. This process allows the router to manage traffic efficiently and direct packets along the correct path in the network.
What are the common vulnerabilities associated with network switches and routers?
Common Vulnerabilities Associated with Switches and Routers:
-
MAC Address Table Flooding (Switches):
- Vulnerability: Managed switches can be vulnerable to MAC address table flooding, where an attacker overwhelms the switch’s table with fake MAC addresses. This causes the switch to function as a hub, broadcasting traffic to all devices on the network, which can then be intercepted through eavesdropping.
-
VLAN Manipulation (Switches):
- Vulnerability: Attackers can exploit vulnerabilities in VLAN configurations to gain access to devices on other VLANs, effectively bypassing network segmentation and accessing sensitive data across different networks.
-
Service Exploits (Routers):
- Vulnerability: Routers are susceptible to attacks on their services, such as discovery protocols that can be manipulated to reveal information about neighbouring networks and routers, potentially exposing the network to further attacks.
-
Buffer Overflows (Routers):
- Vulnerability: Routers can be targeted with oversized ICMP echo requests (ping packets), leading to buffer overflow conditions. This can result in a denial of service (DoS) attack, causing the router to crash or become unresponsive.
-
Routing Table Manipulation (Routers):
- Vulnerability: Attackers can manipulate routing protocol updates to alter routing tables within routers. This can lead to man-in-the-middle attacks or DoS attacks, disrupting network traffic and redirecting it through malicious paths.
These vulnerabilities highlight the importance of securing both switches and routers to prevent unauthorised access, data interception, and service disruptions within a network.
What are the different types of network media and their associated vulnerabilities?
Types of Network Media and Their Vulnerabilities:
-
Twisted Pair Cable (Ethernet)
- Description: Consists of pairs of copper wires twisted together to reduce electromagnetic interference. Commonly used in local area networks (LANs) for connecting devices like computers, switches, and routers.
-
Vulnerabilities:
- Electromagnetic Interference (EMI): Susceptible to interference from nearby electrical equipment, which can degrade signal quality.
- Physical Tapping: Can be physically tapped into, allowing an attacker to eavesdrop on communications.
- Signal Attenuation: Over longer distances, the signal can weaken, leading to data loss or corruption.
-
Coaxial Cable
- Description: A type of copper cable with a single central conductor, surrounded by an insulating layer, a metallic shield, and an outer protective layer. Used in older Ethernet networks and for cable TV.
-
Vulnerabilities:
- Signal Leakage: Coaxial cables can leak signals, making them susceptible to interception.
- Shared Medium: In older networks, the coaxial cable is a shared medium, meaning that all data is broadcast to all devices, increasing the risk of eavesdropping.
- Physical Tapping: Like twisted pair, coaxial cables can also be tapped for unauthorised data capture.
-
Fibre Optic Cable
- Description: Uses light to transmit data through glass or plastic fibres. It offers high bandwidth and is used in backbone connections, high-speed networks, and long-distance communication.
-
Vulnerabilities:
- Physical Damage: Fibre optic cables are more fragile than copper cables and can be damaged easily, disrupting communication.
- Tapping: While more difficult, fibre optic cables can be tapped using sophisticated methods, like bending the cable to leak light, though this often requires specialised equipment.
- Signal Degradation: Fibre optics can suffer from signal loss due to bends or improper connections, though this is less of a security concern and more of a quality issue.
-
Wireless (Wi-Fi)
- Description: Transmits data using radio waves over the air, allowing for mobility and flexibility in device placement within the network.
-
Vulnerabilities:
- Eavesdropping: Wireless signals can be intercepted by any device within range, making it easier for attackers to capture data if not properly encrypted.
- Interference: Wireless signals are prone to interference from other wireless devices, physical obstructions, and environmental factors, which can degrade performance and security.
- Rogue Access Points: Attackers can set up rogue access points to intercept and manipulate network traffic, leading to potential data breaches.
Comparison of Vulnerability:
- Fibre Optic offers the highest security and resistance to eavesdropping but is more expensive and fragile.
- Wireless is the most vulnerable to eavesdropping and interference, requiring strong encryption and security protocols.
- Twisted Pair and Coaxial cables are moderately secure but can be physically tapped into, making physical security important.
Each type of network media has specific vulnerabilities, with fibre optic generally being the most secure, and wireless networks presenting the greatest risks if not properly protected.
What are the three elements of information security?
- Logical Security: Safeguarding data within systems from threats that originate from software and communication channels.
- Physical Security: Securing the physical systems that store data and ensuring the safety of the individuals who use these systems.
- Premises Security: Ensuring the protection of people and property within a specific area, building, or facility.
What are the three main threats to physical security?
- Environmental
- Technical
- Human threats
What are the 4 categories of human-caused physical threats?
The four main human-caused physical threats are:
-
Unauthorised Access:
- Individuals gaining entry to restricted areas without permission, potentially leading to theft, tampering, or sabotage of critical systems and data.
-
Vandalism:
- Deliberate destruction or defacement of property, which can disrupt operations, damage equipment, and result in costly repairs or replacements.
-
Theft:
- The stealing of valuable equipment, devices, or sensitive information, which can lead to data breaches, financial loss, and compromised security.
-
Misuse:
- Improper or negligent use of systems, equipment, or access by authorized individuals, leading to unintended damage, data loss, or security vulnerabilities.
What are the 4 main network threats?
The four main network threats are:
-
Service Disruption:
- Preventing users from accessing services on a network through attacks such as Denial of Service (DoS) on servers, network devices, and links, which overwhelm resources and cause outages or slowdowns.
-
Information Theft:
- Unlawful access to computers and servers to obtain confidential information for criminal purposes, such as stealing sensitive data through phishing, malware, or network intrusions.
-
Data Manipulation:
- Gaining unauthorised access to systems to destroy, manipulate, or alter data, which can lead to data corruption, loss of integrity, or unauthorised changes to critical information.
-
Identity Theft:
- Stealing personal information from systems to impersonate individuals and commit fraud, often involving the use of stolen credentials to gain unauthorised access to network resources.
What are some common network vulnerabilities?
In addition to the vulnerabilities faced by end users and networking hardware that we’ve previously discussed, there are several other vulnerabilities within the network infrastructure that need our attention. These include:
- Network Services: Many services and protocols, such as FTP, HTTP, SMTP, and Telnet, are inherently insecure as they transmit unencrypted data across the network, making them susceptible to interception.
- Operating Systems: No operating system is completely secure. Some may offer better security features than others, but all are vulnerable to various types of attacks.
- User Accounts: Issues arise when usernames and passwords are transmitted insecurely, making them easy targets for interception. Additionally, weak passwords pose a significant security risk.
- Internet Services: Vulnerabilities can exist in web services and browsers, particularly when they are not updated regularly or use weak, unencrypted methods for data transmission. Additionally, outdated or vulnerable browser plug-ins, such as Java and JavaScript, can introduce further risks.
- Products: Software and hardware products may come with security flaws in their default settings, such as weak default passwords, which can be easily exploited.
- Misconfigured Network Equipment: Incorrect configurations or errors in routers, switches, and firewalls can lead to traffic being misdirected or unintentionally allowed into protected areas, compromising the network’s security.
What are the 3 types of reconnaissance attack?
The three types of reconnaissance attacks are:
-
Internet Query:
- Description: This type of reconnaissance involves using basic tools like search engines, ‘nslookup,’ and ‘whois’ to gather information about a target’s address space. Attackers can identify domain names, IP addresses, and other publicly available information about the victim’s network without directly interacting with it, making this a form of passive reconnaissance.
-
Ping Sweep:
- Description: In this type of attack, tools such as ‘gping’ and other scanner software are used to discover active hosts within a network. After identifying potential targets through internet queries, attackers use ping sweeps to determine which hosts are live and responsive, setting the stage for further exploration. This technique involves direct interaction with the network, making it a form of active reconnaissance.
-
Port Scanning:
- Description: Once active hosts are identified, attackers use tools like ‘nmap’ to scan for open ports on these hosts. By identifying open ports, attackers can find services that might be exploited if left unsecured. Different types of port scans (e.g., TCP, UDP, ACK, SYN) can reveal various details about the network’s services and vulnerabilities. This is another form of active reconnaissance that can be detected by security systems.
What are the 3 types of DDoS attacks?
The three main types of Distributed Denial of Service (DDoS) attacks are:
-
Volume-Based Attacks:
- Description: These attacks overwhelm the target network or server with massive amounts of traffic, consuming all available bandwidth. The goal is to saturate the bandwidth, making it impossible for legitimate users to access the service.
- Examples: UDP floods, ICMP (ping) floods, and amplification attacks (e.g., DNS amplification).
-
Protocol Attacks:
- Description: These attacks target specific network protocols and exploit weaknesses in how protocols handle data. By overwhelming protocol-specific resources such as connection tables or firewalls, the attacker can disrupt services.
- Examples: SYN floods, fragmented packet attacks, and Ping of Death.
-
Application Layer Attacks:
- Description: These attacks focus on the application layer (Layer 7 of the OSI model) and aim to overwhelm the application or web server with a high volume of requests. The goal is to exhaust the server’s resources, making the application or website unavailable to legitimate users.
- Examples: HTTP floods, Slowloris attacks, and DNS query floods.
Each type of DDoS attack targets different aspects of a network or system, making them difficult to defend against without comprehensive security measures.
What are the techniques used by routers to mitigate DoS attacks?
Routers employ several techniques to mitigate Denial of Service (DoS) attacks. These techniques help to identify, limit, and block malicious traffic, ensuring the network remains available to legitimate users. Here are some of the key techniques:
-
Rate Limiting:
- Description: This technique limits the amount of traffic that can be sent or received by the router to prevent overwhelming it with excessive data. By capping the rate of incoming and outgoing traffic, rate limiting helps to reduce the impact of DoS attacks, particularly volume-based attacks.
-
Access Control Lists (ACLs):
- Description: Routers can be configured with ACLs to filter and block malicious traffic. ACLs allow network administrators to specify which types of traffic are allowed or denied based on criteria such as IP addresses, protocols, or port numbers. By blocking traffic from known malicious sources or certain types of traffic commonly used in DoS attacks, ACLs help mitigate these threats.
-
Unicast Reverse Path Forwarding (uRPF):
- Description: uRPF is a technique that helps prevent IP address spoofing, a common method used in DoS attacks. It works by checking the source IP address of incoming packets against the routing table. If the source address does not match the expected path, the packet is discarded. This helps to block spoofed traffic that could be part of a DoS attack.
-
Traffic Filtering and Scrubbing:
- Description: Routers can be configured to inspect incoming traffic and filter out malicious packets before they reach the network. Scrubbing centres, often deployed at the ISP level, can also clean traffic by removing malicious data before it reaches the router, helping to mitigate large-scale DoS attacks.
-
Deep Packet Inspection (DPI):
- Description: DPI is a more advanced technique that inspects the contents of packets rather than just the headers. By analysing the data within the packets, DPI can identify and block malicious traffic patterns associated with DoS attacks, including application-layer attacks.
-
Connection Limiting:
- Description: Routers can limit the number of simultaneous connections to a server or application. This helps to prevent connection-oriented DoS attacks, such as SYN floods, by ensuring that the router or server does not get overwhelmed by too many connections at once.
-
Blackholing/Null Routing:
- Description: In response to a DoS attack, a router can be configured to drop all traffic destined for a particular IP address (blackholing) or to redirect it to a null route (null routing). While this effectively removes the target from the network, it can prevent the DoS attack from impacting other parts of the network.
-
IP Source Guard:
- Description: This technique helps to prevent IP spoofing attacks by ensuring that traffic on a router port has a valid source IP address. If the source IP does not match the expected address for that port, the traffic is blocked.
By implementing these techniques, routers can play a crucial role in protecting networks from various types of DoS attacks, helping to maintain service availability and network performance.