Telecommunications and Network Security: CISSP Guide To Security Essentials
Telecommunications and Network Security: CISSP Guide To Security Essentials
Telecommunications and Network Security: CISSP Guide To Security Essentials
Network Security
A. Frame Relay
B. T-3
C. SONET
D. ATM
E. DSL
Which of these is used for cable
Internet service?
A. DSL
B. MPLS
C. DOCSIS
D. SDH
E. WIMAX
Which of these can transmit data at
70 Mbps with microwaves?
A. Frame Relay
B. SDH
C. WIMAX
D. CDMA2000
E. EDGE
Network Technologies
Wired Network Technologies
• Ethernet
– Frame-based protocol
• 14 byte header
• Payload (46-1500 bytes)
• Checksum
• Inter-frame gap
– Error detection: Carrier Sense Multiple Access
with Collision Detection (CSMA/CD)
– MAC address: 6 bytes. Format xx.xx.xx.yy.yy.yy.
• xx.xx.xx assigned to manufacturer
Wired Network Technologies
(cont.)
• Network cabling
– Ethernet
• 10BASE-T – this is the commonly twisted-pair
network cable that supports the Category
3, 5, or 6 ANSI standard. This cable has 8 conductors, of
which 4 are used. An 8-pin RJ45 connector is used to
connect a cable to a device.
• 100BASE-TX – the same twisted-pair network
cable (Category 5 and 6) and connectors
as 10BASE-T, and also uses just
4 of the 8 conductors
• 1000BASE-T – the same twisted-pair network
cable and connectors as 100BASE-TX, except
that all 8 conductors are used.
Wired Network Technologies
(cont.)
– Ethernet (cont.)
• 10BASE2 – the old “thinnet” coaxial cabling
with twist-lock BNC connectors – rarely used.
• 10BASE5 – the old “thicknet” coaxial cabling
that is rarely used.
Wired Network Technologies
(cont.)
• Twisted pair cabling
– Category 3 – consists of four twisted pairs in a
single jacket. Suitable only for 10Mbit/s Ethernet.
Superseded by Category 5 and 5e.
– Category 5 – consists of four twisted
pairs in a single jacket. Maximum length
is 100m. Suitable for 100Mbit/s and can
be used for Gigabit Ethernet.
– Category 5e – supersedes Category 5 and
includes specifications for far end crosstalk.
Wired Network Technologies
(cont.)
• Twisted pair cabling (cont.)
– Category 6 – backward compatible with Category
5 and 5e, but higher specifications for noise and
crosstalk, making it more suitable for Gigabit
Ethernet.
– Category 7 – even more stringent than
Category 6 cabling, Cat-7 is suitable
for 10Gbit/s networks.
Wired Network Technologies
(cont.)
• Cabling
– Optical
• Carries signal in the form of light instead of electricity
• Greater speeds and distances possible
• More expensive
Wired Network Technologies
(cont.)
• Ethernet devices
– Hub – connects local stations together; sends each
frame to every connected node
– Repeater – extend signal over distances
– Switch – like a hub but sends data only to the correct
node
– Router – connect networks to each other
– Gateway – translates various types of
communications
Wired Network Technologies
(cont.)
• Token ring
– Logical ring
– Speed: 4Mbit/s and 16Mbit/s
– Mostly replaced by Ethernet
Wired Network Technologies
(cont.)
• Universal Serial Bus (USB)
– Successor to RS-232 serial
– Speeds
• USB 1.0/1.1 – 1.5 Mbits/s and 12 Mbits/s
• USB 2.0 – 480 Mbits/s
• USB 3.0 – 4.8 Gbits/s
– Hot pluggable
– Used to connect peripheral and human
interface devices
Wired Network Technologies
(cont.)
• RS-232
– Serial communications, speeds 110 bit/s – 57.7
kbit/s
– Used to connect communications devices such as
modems, and human interface devices such as mice
– Largely replaced by USB
Wired Network Technologies
(cont.)
• HSSI (High Speed Serial Interface)
– 52Mbits/s, cable length 50’, used to
connect WAN devices
• FDDI (Fiber Distributed Data Interface)
– Token technology over fiber that has
been replaced by gigabit Ethernet and SONET
• Fibre Channel
– Gigabit protocol used in SANs (Storage
Area Networks)
Common Network Topologies
A. Hub
B. Repeater
C. Switch
D. Router
E. Gateway
Which protocol runs at 52 Mbps,
with a maximum cable length of 50
feet?
A. Token ring
B. RS-232
C. HSSI
D. FDDI
E. Fibre Channel
Which protocol only transmits data a
distance of 10 centimeters?
A. Wi-Fi
B. Bluetooth
C. IrDA
D. WUSB
E. NFC
Network Protocols
OSI Protocol Model
• Application
• Presentation
• Session
• Transport
• Network
• Data link
• Physical
OSI Mnemonics
• Please Do Not Throw Sausage Pizza
Away
• All People Seem To Need Data
Processing
OSI Protocol Model: Physical
• Concerned with a network’s physical
media
– Electrical
– Optical
– Radio frequency
• Example standards
– RS-232, RS-422, T1, E1, 10Base-T, SONET,
DSL, 802.11a (physical), Twinax
OSI Protocol Model: Data Link
• Concerned with the transfer of data
between nodes
• Manages error correction for any errors
that take place at the physical layer
• Example standards
– 802.3 (Ethernet), 802.11a MAC, GPRS, AppleTalk,
ATM, FDDI, Fibre Channel, Frame Relay,
PPP, SLIP, Token Ring, Wi-MAX
– ARP could be placed here, or in layer 3 (link Ch 10f)
OSI Protocol Model: Network
• Used to transport variable-length data
sequences between nodes
• Manages fragmentation and reassembly
• Communications are point-to-point
• No notion of a “connection”
• Data packets may not arrive in order
• Example standards
– IP, ICMP, ARP, IPX
OSI Protocol Model: Transport
• Manages the delivery of data from
node to node on a network
– Even when there are intermediate devices
such as routers and a variety of physical media
between the nodes
– Manages “connections”
• Guarantee the order of delivery of data packets,
packet reassembly, error recovery
– Examples: UDP, TCP, IPsec, PPTP, L2TP, SPX
OSI Protocol Model: Session
• Manages connections between nodes,
including session establishment,
communication, and teardown
• Example standards
– NetBIOS, TCP sessions, SIP
OSI Protocol Model: Presentation
• Deals with the presentation or
representation of data in a
communications session
– Character set translation
– Compression
– Encryption
• Examples of presentation - layer
standards include SSL, TLS, MIME, and
MPEG
OSI Protocol Model: Application
• Top-most layer in the OSI
network model
• Concerned with the delivery of data
to and from applications
• Examples standards
– DNS, NFS, NTP, DHCP, SMTP, HTTP,
SNMP, SSH, Telnet, WHOIS
TCP/IP Protocol Model
• Application
• Transport
• Internet
• Link
A. Application
B. Transport
C. Internet
D. Link
E. Physical
What is the subnet mask for a class
B network?
A. 0.0.0.0
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
E. Something else
Which routing protocol uses hop
count as the metric?
A. BGP
B. RIP
C. EIGRP
D. OSPF
E. IS-IS
Network Authentication Protocols
Authentication Protocols
• RADIUS (Remote Authentication Dial In
User Service)
– Over-the-wire protocol from client to AAA
(authentication, authorization, accounting) server
• Diameter – more advanced RADIUS
replacement
Authentication Protocols (cont.)
• TACACS (Terminal Access Controller Access-
Control System) – authenticates user to a
network.
– Between access point or gateway and
an AAA server
– Replaced by TACACS+ and RADIUS
• 802.1X – port level access control. System
authenticates before user authenticates
Authentication Protocols (cont.)
• CHAP (Challenge-Handshake Authentication
Protocol)
– Between client system and gateway
• PPP uses CHAP
• EAP (Extensible Authentication Protocol)
– Authentication Framework – used to authenticate users in
wired and wireless networks. Used by WPA and WPA2
wireless network standards.
Authentication Protocols (cont.)
• PEAP (Protected Extensible
Authentication Protocol)
– used in wireless networks to authenticate users
– PEAP uses an SSL/TLS tunnel to encrypt
authentication information
• PAP (Password Authentication Protocol)
– unsecure because protocol is unencrypted
Network-Based Threats, Attacks,
and Vulnerabilities
Network Threats
• The expressed potential for the
occurrence of a harmful event such
as an attack
– DoS / DDoS – designed to flood or
cause malfunction
– Teardrop - attacker sends mangled packet fragments
with overlapping and oversized payloads to a target
system
Network Threats (cont.)
• Threats (cont.)
– Sequence number – guesses upcoming sequence
numbers as a method for hijacking a session
– Smurf - large number of forged ICMP echo requests.
The packets are sent to a target network’s
broadcast address, which causes all systems on the
network to respond
Network Threats (cont.)
• Threats (cont.)
– Ping of Death – ICMP echo request, 64k length
– SYN flood – large volume of TCP SYN packets,
consumes resources on target system
– Worm – automated, self-replicating program
– Spam – unsolicited commercial e-mail (UCE): fraud,
malware, marketing
– Phishing – emails luring users to fraudulent sites
– Pharming – attack on DNS that redirects access to
legitimate sites to imposter sites
Network Vulnerabilities
• Unnecessary open ports
• Unpatched systems
• Poor and outdated configurations
• Exposed cabling
Network Countermeasures
Network Countermeasures
• Access control lists
• Firewalls
• Intrusion Detection System (IDS)
– Network based (NIDS)
– Host based (HIDS)
Network Countermeasures (cont.)
• Intrusion Prevention System (IPS)
– Network and host based
• Protection of network cabling
• Anti-virus software
• Private addressing (10.*.*.*, etc.)
Network Countermeasures (cont.)
• Close unnecessary ports and services
• Security patches
• Unified Threat Management (UTM)
– Security appliances that perform many functions,
such as Firewall, IDS, IPS, Antiirus, Anti-spam, Web
content filtering
• Gateways – filtering intermediaries
iClicker Questions
Which authentication framework is
used by WPA2?
A. PAP
B. PEAP
C. EAP
D. CHAP
E. EAP
Which attack uses broadcast
packets to amplify its effect?
A. DoS
B. Teardrop
C. Smurf
D. Ping of Death
E. SYN flood
Which attack poisons a DNS record?
A. Phishing
B. Teardrop
C. Pharming
D. Ping of Death
E. SYN flood