Topic 4 - Networks Flashcards
(95 cards)
What is the formal definition of the TCP/IP Model?
It is a framework for communication over the computer network
What are the 5 layers for the TCP/IP model, and what do they do?
Application Layer - Provides applications with standardised data exchange
Transport Layer - Responsible for end-to-end communications across the network, along with error control and flow control
Network Layer - Responsible for logical addressing, routing and path determination for IP packets from source to destination by identifying neighbours.
Data Link Layer - Encapsulates IP packets into data frame by adding MAC addresses and error checksum and provides data transmission between two devices attached to the same network
Physical Layer - Provides transmission of data using electrical or mechanical interfaces
What are some key properties surrounding IP security?
IPs are connectionless and stateless
They provide best effort service
No delivery guarantee
No order guarantee
How does IPSec work?
Two major mechanisms:
- Authentication Header: Authentication only
- Encapsulation Security Payload: Authentication & Encryption
Does not contains any mechanisms to prevent traffic analysis, as payload is encrypted
How does the Encapsulation Security Payload work?
It includes an additional header within the IP packet that describes what encryption and authentication is in use
What are some key properties of Security Parameter Index?
Stores security parameters e.g. crypto protocol and keys
Uses Diffie-Hellman for key exchange
The Index references the entry in a table that corresponds to the session’s parameters
What are the differences between Transport and Tunnel modes for Encapsulation Security Payload?
Transport Mode:
- Encrypts packets, providing host-to-host encryption, but uses the original IP header
- Prevents contents being read, but doesn’t stop traffic analysis or manipulation of the header
Tunnel Mode:
- Protects some segment of a channel with encryption
- Provides some resistance to traffic analysis, and completely protects manipulation of the payload
What layers make up a VPN?
IPSec ESP Tunnel Mode (Network Layer)
TLS (Application Layer)
SSH (Transport Layer)
WireGuard (Network Layer)
What are the primary uses for a VPN?
Used to provide C/I/Auth for remote access to resources
Instrumental for remote working
What is Address Resolution Protocol?
ARP is a protocol used in IPv4 to obtain physical MAC addresses for given IPs, and is used prior to constructing IP and TCP packets for communication
What is ARP Cache Poisoning?
Send an unrequested ARP reply, and overwrite the MAC address in a hosts ARP cache with our own
What type of attack is ARP Cache Poisoning considered as?
A man-in-the-middle attack
How do you protect against ARP Cache Poisoning attacks?
OSs can be configured to use ARP differently, and can also ignore unsolicited ARP replies
Intrusion detection packages will include ARP spoofing protection
How do Intrusion Detection packages protect against ARP Cache Poisoning Attacks?
They maintain a log of current MAC:IP assignments and ARP requests/replies
It allows the software to spot suspicious messages such as unsolicited ARP replies
What is Domain Name System?
Domain Name System translates domain names into IP addresses
DNS resolvers will also cache the IPs for a while
How does DNS Spoofing work?
If possible to poison the cache of a nameserver people are using, you can replace a website lookup with a different IP
How can you implement DNS Spoofing?
Can be achieved through prior ARP cache Poisoning, a reply flood, or a Kaminsky attack
How do you protect DNS?
Random query numbers protect against spoof replies
Randomising the source port as well can help
DNSSEC tackles DNS exploits by authenticating the name server and providing integrity for the messages
How does TCP Sequence Prediction Attack work?
Sequence numbers are used to keep track of order of packets in TCP
Use that sequence to attack another separate machine
How do you defend against a TCP Sequence Prediction Attack?
Use Randomised SNs
Use lower layer information
Configure your router/firewall to disallow external sources and IDS/IPS
What is network segmentation, and why would you implement it?
Dividing computer networks into smaller parts
It’s mainly to provide damage control, and contain certain attacks to specific areas
What makes a Zero Trust network different from standard networks?
Zero Trust networks contain no implicit trust
Everything must be verified on the network, regardless of if you’re in the internal network or the external
What are some key areas of Zero Trust networks?
Explicit and manual authentication
Context-aware
Attribute/role-based access control
Least privilege
Network Segmentation
What is the current standard for WiFi Security, and what are some of its properties?
WPA2
128-bit keys
Two levels - Personal (Pre-Shared Key) or Enterprise (unique credentials)