Section 11 - Network Security Flashcards
What does “OSI” stand for?
Open Systems Interconnection
This is used to explain how network communications occur between a host and a remote device over a local area network or a LAN.
OSI Model
*** This is very useful to help us categorize different communication protocols that are used in networks, and gives us a common lexicon that we can use to describe the function of different devices.
What is a helpful mnemonic that can be used to represent the seven layers of the OSI model?
Please - Physical
Do - Data Link
Not - Network
Throw - Transport
Sausage - Session
Pizza - Presentation
Away - Application
*** going from bottom to the top.
What is the first layer of the OSI model?
Physical Layer
This is the layer that represents the actual network cables and radio waves that are used to carry data over a network. Data carried over the network at the physical layer is known as bits.
Ex - fiber optic, copper, or coaxial cable, Wi-Fi, Bluetooth, hubs, repeaters, etc.
What is the second layer of the OSI model?
Data Link Layer
This layer describes how a connection is established, maintained, and transferred over that physical layer. Addressing here is done using physical addresses, like the MAC address. Bits are grouped into frames and then sent over the network.
Ex - MAC addresses, switches, bridges.
How is a switch different than a hub?
Switches use MAC addresses as their form of physical addressing. This allows a switch to decide where to send that frame of information based on the MAC address it’s designed to go to. And so, it’s smarter than a hub because it will decide where that particular frame goes as opposed to just repeating it out every single port that it has.
What is the third layer of the OSI model?
Network Layer
This is where logical addressing is actually performed. routing and switching information between hosts, the network and the internetworks. This is the layer where the frames are taken and grouped into packets.
Ex - IP addresses and routers (as these are used to connect to all of our networks together)
What is the fourth layer of the OSI model?
Transport Layer
Manages and ensures transmission of the packets occur from the host to the destination it wants. This uses either TCP or UDP. At this point, our packets are now grouped into segments (TCP) or datagrams (UDP).
What is the difference between TCP and UDP?
TCP has that three-way handshake, and it says, hey I’m ready to send you something, okay I’m ready to be sent something. All right, let’s start sending it. And then they send the information. With UDP, on the other hand, it’s just fire and forget, we send a bunch of information and we just hope it gets there.
What is the fifth layer of the OSI model?
Session Layer
This layer manages the establishment, termination, and synchronization of a session over the network.
What is the sixth layer of the OSI model?
Presentation Layer
This layer is focused on translating the information into a format that both the sender and the receiver are going to understand.
*** after all, data is nothing but ones and zeroes which is not a language that most people can decipher. The presentation layer helps translates that information into a format that can be understood.
Ex - JPGs, PNG files, encryption.
What is the seventh layer of the OSI model?
Application Layer
This is the layer where the message is originally created and sent from. This is where the user is really starting to interact with the network by using the OSI model.
EX - HTTP for web pages, SMTP for emails, and FTP for file transfer.
This was used to separate physical LANs or WANs into two logical networks, or connect two logical networks together.
Bridge
*** These came after hubs because they were dumb and causing a lot of collisions and slowed down the network.
Essentially, every single port on a ___ acts as if it was a bridged hub on each one.
switch
*** This means that it improves the data transfer and security through the intelligent use of MAC addresses, being able to figure out where a device is and only sending information out that particular port of the switch and ignoring the rest.
Switches are subject to three main types of attack. What are they?
MAC Flooding
MAC spoofing
Physical Tampering
This is an attempt to overwhelm the limited switch memory that’s set aside to store the MAC addresses for each port, and this is known as the content addressable memory (CAM).
MAC Flooding
*** If a switch is flooded, it can fail-open and begin to start acting like a hub and broadcasting data out every single port.
This occurs when an attack masks their own MAC address to pretend that they are having the MAC address of some other machine on the network.
MAC spoofing
*** By switching your MAC address to a known or allowed device, you can gain access to a network bypassing the access control list (ACL).
This occurs when an attacker attempts to gain physical access to the switch.
Physical Tampering
Switches operate at layer two of the OSI model by making their decisions based on MAC addresses, ___ operate at layer three, making their decisions based on IP addresses.
routers
Routers are used to connect…?
two or more networks to form an internetwork
___ ___ ___ can be configured on the router’s interface to control the flow of traffic into or out of a certain part of the network.
Access Control List (ACL)
These are a set of rules that will either permit or deny traffic based upon certain characteristics, like its source or destination IP address, the source or destination port number associated with it and the application or service being run.
ACLs
Most networks are segmented into at least three different zones:
LAN
WAN
DMZ
This segment can be secured using private IPs, using anti-malware programs, and by placing your clients behind a router and its associated ACLs.
LANs
This segment should be monitored and firewalled to secure your networks against the threats that those contain. The internet is the world’s largest version of this.
WAN