Session 1: Background and core concepts Flashcards

1
Q

What are the oldest forms of networks?

A

Networks have been utilized for long range communication for thousands of years. Beacons, i.e., lighting fires atop hills/elevated terrain was frequently utilized to signal the approach of enemies in ancient times.

More recently, in the 19th century semaphore lines were built in several countries. This is essentially a line of towers placed on elevations with a simple mechanical device with arms put on top. The configuration of the arms determined message being relayed. These towers were usually placed several km apart since all towers were equipped with a telescope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are considered the three general types of network topology?

A

Centralized networks is often the simplest to construct, where all nodes are directly connected to a main hub/master node, through which all network traffic flows. This is the cheapest type since it only requires N-1 direct links for a network with N links. Centralized networks are also considered the weakest as a failure on the central node makes the entire network collapse.

Decentralized networks do not solely rely on one central node. Instead, some of the load is distributed to other nodes. This implies that not all communication breaks down if the most important node in the network fails. Consequently, distributed networks can be significantly more robust. In terms of costs, decentralization can be achieved with the same number of connections/links between nodes, i.e., we can achieve decentralization for a network containing N nodes while only needing N-1 links.

Distributed networks (also known as mesh) allow each node to connect to several others, which makes such networks superior in terms of robustness. However, a distributed network topology will quickly require many more links, which makes them much more expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the OSI reference model?

A

The OSI model is an attempt of structuring network communication into different layers. The intent is to make the computer networking a better organized domain. The OSI model has 7 distinct layers where a given layer only directly interacts with the layer above and below.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the layers in the OSI model?

A

If we start at the top we have:

Application layer which handles communication at the level of application tasks.

Presentation layer is responsible of handling the encoding and decoding of the data from the application layer (may be used to encrypt application data).

Session layer manages logical connections between systems to establish, terminate and restart sessions between end points.

Transport layer handles the end-to-end transport of data. This can be carried out in different classes, i.e., connection-oriented or connection-less. There are also different grades of guarantee of delivery.

Network layer handles addressing and transmitting/routing data end-to-end.

Data link layer handles the bits and bytes from the physical layer and structures them into frames or packets.

Physical layer handles the physical interfaces and electrical/optical specifications (mainly just all the cables and devices involved during transmission).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List the threat categories provided by ENISA

A

Physical attack - Attacks involving physical manipulation or access to media devices.

Unintentional damage - E.g. human error leading to information leaks,
integrity breaches.

Disaster - E.g. fire, dust, water, unfavourable climate.

Malfunction - E.g. hardware, power faults, RF interference.

Outages - E.g. key staff absence, network infrastructure faults.

Interception - Includes data in flight and at rest, active attacks.

Abuse - E.g. malware, social engineering.

Legal - E.g. failure to comply with legal, regulatory requirements.

(Not exclusive for network security, but important for the field)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is Quality of Service (QoS) handled within networking?

A

QoS is difficult to implement in networks and is therefore mostly handled on a best effort basis. Protocols trying to better enable QoS have largely proven inadequate. Ensuring sufficient performance is mostly handled by over provisioning the networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly