CISSP Domain 4 Flashcards
Communication and Network Security
OSI and TCP/IP Models Protocol types and security issues LAN, WAN, MAN, Intranet, and extranet technologies Cable types and data transmission types Network devices and services Communications security management Telecommunications devices and technologies Wireless technologies Network Encryption Threats and attacks Software defined routing Content distribution networks Multilayer protocols Convergent network technologies
Telecommunications
the electromagnetic transmission of data among systems
OSI Reference Model
ISO standard 7498 provides important guidelines used by vendors, engineers, developers, and others.
Encapsulation
Message moves down one stack and up another through the OSI model
Application Layer 7
works closest to the user and provides file transmissions, message exchanges, terminal sessions, and much more.
Does not include applications
passes instructions and data
Application Layer protocols
SMTP HRRP DNS IRC LDP
Presentation Layer 6
puts information in a format
common means of representing data in a structure
Presentation layer works as a
Translator.
Not concerned with the meaning of data,
but syntax and format
Presentation Layer formats
TIFF
GIF
JPEG
Compression
Presentation Layer handles
data compression and encryption
Only layer without protocols
Session Layer 5
Responsible for establishing a connection between two applications, maintaining it during the data transfer, and controlling the release of the connections.
Session Layer phases
Establish connection
data transfer
connection release
restart and connection if necessary
maintenance of the session.
Session Layer Protocols
Password Authentication Protocol (PAP)
Point to Point Tunneling Protocol (PPTP)
Network Basic Output System (NetBIOS)
Remote Procedure Call (RPC)
Session Layer modes
Simplex
Half Duplex
Full Duplex
difference between Session and Transport layers
Session is between 2 applications
Transport is between 2 computers
Security issue with RPC
lack of authentication or weak authentication
Session Layer protocols are
the least used in a network environment
Should be disabled
ATM
Asynchronous Transfer Mode
OSI Layers vs TCP/IP Layers
Application Application
Presentation
Session
___________________________________
Transport Host to Host
___________________________________
Network Internet
___________________________________
Data Link Network Access
Physical
Network Attacks can be
used as a channel for an attack
or
be the target of attack
Transport Layer 4
When 2 computers communicate
Handshaking process
Transport Layer provides
reliable data transfer error detection correction recovery flow control Optimization end to end data transport services establishes logical connection between two computers
Transport Layer Protocols
TCP Transport Control Protocol
UDP User Datagram Protocol
IPX
TCP vs UDP
connection vs best effort