Domain 4: Communication and Network Security Flashcards
Name the Layers of the TCP/IP Model
- Application
- Transport
- Internet
- Network Access
Open standard primarily used within the energy sector for interoperability between various SCADA vendors’ and smart grid applications
Distributed Network Protocol (DNP3)
Storage networking that leverages Fibre Channel but is transmitted across standard ethernet networks
Fibre Channel over Ethernet (FCoE)
Storage network that leverages existing networking infrastructure and protocols to interface with storage
iSCSI
- iSCSI technology
- Provides a way of addressing storage across the network
Logical Unit Numbers (LUNs)
- Sends traffic over a radio band
- Uses a number of small frequency channels throughout the band and “hops” through them in pseudorandom order
Frequency-Hopping Spread Spectrum (FHSS)
- Sends traffic over a radio band
- Uses the entire band at once, “spreading” the signal throughout the band
Direct-Sequence Spread Spectrum (DSSS)
- Sends traffic over a radio band
- Allows simultaneous transmissions to use multiple independent wireless frequencies that do not interfere with each other
Orthogonal Frequency-Division Multiplexing (OFDM)
- Wireless Standard
- Top Speed: 2 Mbps
- Frequency: 2.4 GHz
802.11
- Wireless Standard
- Top Speed: 11 Mbps
- Frequency: 2.4 GHz
802.11b
- Wireless Standard
- Top Speed: 54 Mbps
- Frequency: 2.4 GHz
802.11g
- Wireless Standard
- Top Speed: 54 Mbps
- Frequency: 5 GHz
802.11a
- Wireless Standard
- Top Speed: 72-600 Mbps
- Frequency: 2.4 GHz / 5 GHz
802.11n
- Wireless Standard
- Top Speed: 422 Mbps - 1.3 Gbps
- Frequency: 5 GHz
802.11ac
- Wireless security standard
- Early attempt to provide 802.11 wireless security
- Weak new attacks can break key in minutes
WEP
- Wireless security standard
- Utilizes RSN which allows changes to cryptographic ciphers as new vulnerabilities are discovered
802.11i
- Wireless security standard
- Uses AES encryption for confidentiality
- CCMP for integrity
- aka RSN
WPA2
- Wireless security standard
- RC4 encryption for confidentiality
- TKIP for integrity
- Appropriate when AP lacks power to implement full standard
WPA
- 802.15 PAN wireless technology
- Operates in 2.4 GHz frequency
- Uses Frequency-Hopping Spread Spectrum (FHSS)
- Sensitive devices should disable automatic discovery by other devices
Bluetooth
How can a Bluetooth device be discovered?
- By guessing the MAC address
- First 24 bits are OUI easily guessed
- Last 24 bits can be determined via brute-force attack
Technology used to create wirelessly readable tags for animals or objects
RFID
What are the 3 types of RFID tags?
Active
Semi Passive
Passive
- RFID tag
- Have a battery
- Broadcast a signal
Active RFID tags
- RFID tag
- Have a battery
- Rely on RFID reader’s signal for power
Semi Passive RFID tags