SlideShare a Scribd company logo
1 of 73
Download to read offline
CNIT 125:
Information Security
Professional
(CISSP
Preparation)
Ch 5. Communication and
Network Security (Part 1)
Network Architecture and Design
Fundamental Network Concepts
• Simplex
• One-way communication, like an FM
radio
• Half Duplex
• Sends or receives, but not both at
once, like a walkie-talkie
• Full Duplex
• Sends & receives simultaneously, like a
telephone
Fundamental Network Concepts
• Baseband
• Whole frequency range dedicated to
one signal, like Ethernet
• Broadband
• Multiple channels, each gets only a
portion of the bandwidth
• Like broadcast FM radio
Fundamental Network Concepts
• Analog
• Continuous variations of signal
• Signal degrades over distance and when
repeated
• Like a vinyl record
• Digital
• Signal is a series of zeroes and ones
• Can be transmitted and repeated with no
loss of accuracy
• Like a CD
Fundamental Network Concepts
• LAN (Local Area Network)
• Within a building
• MAN (Metropolitan Area Network)
• Within a city
• WAN (Wide Area Network)
• Covering cities, states, or countries
• GAN (Global Area Network)
• A global collection of WANs
• PAN (Personal Area Network)
• Devices you carry, often using Bluetooth
Fundamental Network Concepts
• Internet
• Global collection of networks running
TCP/IP
• Intranet
• Privately owned network using TCP/IP
• Extranet
• Connects private Intranets
• Such as connections to business
partners
Fundamental Network Concepts
• Circuit-Switched Network
• Dedicated circuit or channel for one
connection
• Ex: a T1 line between businesses
• Packet-Switched Network
• Multiple signals share the same lines
• Data is broken into packets
• Less wasteful and therefore cheaper
than circuit switching
Fundamental Network Concepts
• Quality of Service
• Can give specific traffic precedence
over other traffic
• On a packet-switched network
• Ex: VoIP packets get precedence over
email packets
Fundamental Network Concepts
• Layered Design
• OSI and TCP/IP models use layers
• Each layer performs a specific function
• Changes in one layer do not directly
affect another layer
Fundamental Network Concepts
• Network Model
• A description of how a network
protocol suite operates
• Ex: OSI model, TCP/IP model
• Network Stack
• A network protocol suite programmed
in software or hardware
• Ex: TCP/IP
OSI Model
• Mnemonics
• Please Do Not
Throw Sausage
Pizza Away
• All People Seem
To Need Data
Processing
Layer 1: Physical
• Protocol Data Unit: bit
• Physical media that carry signals
• Ethernet cables
• Radio waves
• Fiber optic cables
• Devices
• Hubs
• Repeaters
• Cables
Layer 2: Data Link
• Protocol Data Unit: frame
• Uses MAC addresses (for Ethernet)
• Devices
• Ethernet card
• Switch
• Bridge
Layer 2: Data Link
• Two sub-layers
• Media Access Control
• Connects to layer 1
• Logical Link Control
• Connects to layer 3
Layer 3: Network
• Protocol Data Unit: packet
• Performs routing, using IP addresses
• Uses IPv4 and/or IPv6
• Device: Router
Layer 4: Transport
• Protocol Data Unit: Segment
• Protocols include UDP and TCP
• Uses Port Numbers
• TCP is reliable, orders segments, and re-
sends undelivered segments
Layer 5: Session
• Network file shares are mounted at the
session layer
• For example, you must log in first
• Connections between applications
Layer 6: Presentation
• Presents data to the application layer in a
comprehensible way
• Data conversion
• Character encoding such as ASCII
• Image formats like GIF and JPEG
• Encryption
• Compression
Layer 7: Application
• Numen-Readable data
• Web browser, word processor, IM client
• Protocols:
• Telnet
• FTP
• HTTP
TCP/IP Model
Network Access Layer
• Combines OSI layers 1 and 2
• Includes cable and NIC
• Uses MAC addresses
Internet Layer
• OSI Layer 3
• IP addresses and routing
• Uses IPv4 or IPv6
Transport Layer
• Matches OSI layer 4
• Contains TCP and UDP
Application Layer
• Combines OSI layers 5-7
• Presents network data to the human user
• Like a Web browser
Encapsulation
• Takes information from a higher layer,
and adds a header to it
• Like putting a letter in an envelope and
addressing it
• Layer 4 TCP SEGMENT
• Is encapsulated in a Layer 3 IP PACKET
• That's encapsulated in a Layer 2 FRAME
• Sent over the wire at layer 1 as BITS
SPF10
• Segment
• Packet
• Frame
• One and Zero (Bits)
Decapsulation
• Also called de-multiplexing
• Happens at receiving end
• The addresses are stripped off the data
packets, and the data is delivered to higher
levels
• BITS are converted to FRAMES
• FRAMES are converted to PACKETS
• PACKETS are converted to SEGMENTS
• SEGMENTS are converted to application data
Network Access, Internet and Transport
Layer Protocols and Concepts
MAC Addresses
• Media Access Control address
• Unique hardware address of an Ethernet
NIC
• Burned in at the factory
• 48 bits long
• First 24 bits form Organizationally
Unique Identifier
• EUI-64 addresses are 64 bits long
• Used in IPv6
IPv4
• Internet Protocol version 4
• 32-bit addresses
• Written as four bytes in decimal
• 192.168.0.1
IPv4 Header
IPv4 Fragmentation
• An intermediate router can fragment a
packet into smaller packets
• To move it onto a network with a
smaller maximum transmission unit
• "Path MTU Discovery"
• Send a large packet with the DF (Don't
Fragment) bit set
• If it's dropped, try a lower packet size
IPv6 Header
IPv6 Addresses and Autoconfiguration
• MAC address used to construct host
portion of IPv6 Address
• Right 64 bits
• fe80:: is the link-local prefix
• Public addresses start with 2 or 3
IPv6 Security Challenges
• Many networks have IPv6 enabled, but
the administrators don't understand how
to manage it
• It can be used for forbidden activity, such
as BitTorrent over IPv6
Disabling IPv6
Classful Networks
• Used until
1993
Classless Inter-Domain Routing (CIDR)
• Allows network sizes between the
classes
• Class A is /8 16 million hosts
• Class B is /16 65,536 - 2 hosts
• Class C is /24 256 - 2 hosts
• 147.144.96.0/20
• 16 class Cs 2048 - 2 hosts
Private IPv4 Addresses
• Defined in RFC 1918
• 10.0.0.0 - 10.255.255.255 (10.0.0.0/8)
• 172.16.0.0 - 172.31.255.255 (172.16.0.0/12)
• 192.168.0.0 - 192.168.255.255
(192.168.0.0/16)
Network Address Translation (NAT)
• Usually used with Port Address Translation (PAT)
• So many clients can share a single public
address
• Other techniques (rarely used)
• Static NAT
• One private address to one public address
• Pool NAT
• A group of public addresses translated one-
by-one to the same number of local
addresses
NAT
192.168.1.101
255.255.255.0
192.168.1.1
192.168.1.102
255.255.255.0
192.168.1.1
192.168.1.103
255.255.255.0
192.168.1.1
192.168.1.1
255.255.255.0
147.144.51.1
IP Address
Subnet Mask
Default Gateway
Hub
To the Internet
A
B C D
ARP (Address Resolution Protocol)
• Used to find MAC addresses on a LAN
• RARP (Reverse Address Resolution
Protocol)
• An early competitor to DHCP to deliver
IP addresses, not common anymore
ARP Request and Reply
■ Client wants to find Gateway
■ ARP Request: Who has 192.168.2.1?
■ ARP Reply:
■ MAC: 00-30-bd-02-ed-7b has 192.168.2.1
Client
 Gateway
 Facebook.com
ARP Request
ARP Reply
ARP Poisoning
Client
 Gateway
 Facebook.com
Attacker

ARP Replies: I
am the Gateway
Traffic to
Facebook
Forwarded &
Altered Traffic
Unicast and Multicast Traffic
• Unicast: One sender to one receiver
• Most common
• Multicast: One sender to several
receivers
• Rare, used by routing protocols
Broadcast Traffic
• One sender to every device on the LAN
• Limited broadcast: 255.255.255.255
• Actually sends layer 2 broadcast, to
MAC address FF:FF:FF:FF:FF:FF
• Directed broadcast: 147.144.255.255
• Was once sent over the Internet
• Blocked now to stop smurf attacks
Promiscuous Network Access
• A NIC in promiscuous mode passes all
frames upward for use
• Even if they are for a different MAC
• Required for Network Intrusion Detection
Systems (NIDS)
• Entering promiscuous mode requires root
privileges
• Switches isolate traffic segments
• So traffic won't be sent to the wrong MAC
address
TCP
• Transmission Control Protocol
• OSI Layer 4
TCP Ports
• 0-1023: Well-known ports
• Require root privileges to listen on
• Also called "reserved ports"
• 1024 - 65535
• Ephemeral ports
• Any user can listen on them
Socket
• A socket is a combination of four
numbers
• Source IP and Source Port
• Destination IP and Destination Port
• Acts like a cable for two-way
transmission
State
• LISTEN
• Waiting for a SYN
• ESTABLISHED
• Handshake complete
TCP Flags
• URG: Urgent
• ACK: Acknowledge
• PSH: Push
• RST: Reset &
• SYN: Synchronize
• FIN: Finish
• Three new flags added in 2001 & 2003
• CWR: Congestion Window Reduced
• ECE: Explicit Congestion Notification Echo
• NS: Nonce Sum
TCP Handshake
UDP
• User Datagram Protocol
• No handshake
• No acknowledgements
ICMP
• Internet Control Message Protocol
• Used to troubleshoot and report error
conditions
• PING
• Sends an ICMP Echo Request
• Gets an ICMP Echo Reply
• Traceroute
• Sends packets with low TTL
• Tracks ICMP Time Exceeded replies
Traceroute
• Unix and Cisco send UDP packets
• Microsoft sends ICMP packets
Application Layer TCP/IP Protocols and
Concepts
• Telnet
• Terminal emulation
• Sends command-lines
• No encryption
• SSH (Secure Shell)
• Encrypted replacement for Telnet
Application Layer TCP/IP Protocols and
Concepts
• FTP (File Transfer Protocol)
• Sends passwords unencrypted
• Uses ports 20 and 21 on the server
• Problems for firewalls (link Ch 5b)
• Active FTP initiates the port 20
connection from the server, not the
client
• Passive FTP uses an arbitrary
ephemeral port on the server
Application Layer TCP/IP Protocols and
Concepts
• TFTP (Trivial File Transfer Protocol)
• Uses UDP port 69
• No authentication at all
• No encryption
• Used to update firmware in routers and
IP phones
Application Layer TCP/IP Protocols and
Concepts
• SSH (Secure Shell)
• Secure replacement for Telnet
• And FTP and the unix "r" commands
• rlogin, rshell, etc.
• Includes SFTP and SCP
• Can be used as a secure tunnel for other
protocols, such as HTTP
• Uses TCP port 22
• SSHv1 is old and vulnerable, SSHv2 is the
current standard
Application Layer TCP/IP Protocols and
Concepts
• SMTP (Simple Mail Transfer Protocol)
• Uses TCP port 25
• Used to send email between servers
• POP (Post Office Protocol)
• TCP port 110
• Used to download email to a local client like
Eudora or Outlook
• IMAP (Internet Message Access Protocol)
• TCP port 132
• Used to download email to a local client like
Eudora or Outlook
Application Layer TCP/IP Protocols and
Concepts
• DNS (Domain Name System)
• Uses UDP and TCP 53
• Large responses require TCP 53
• Zone transfers
• DNSSEC-signed records
• Resolves domain names like ccsf.edu
to IP addresses
Application Layer TCP/IP Protocols and
Concepts
• DNS Server Types
• SOA (Start of Authority)
• Contains the master record for a zone
• Recursive server
• If it doesn't have the requested data,
it will ask other servers
• Caching server
• Stores recently resolved names
Application Layer TCP/IP Protocols and
Concepts
• DNS Weaknesses
• Uses UDP
• No authentication
• Security relies on a 16-bit source port
and a 16-bit DNS query ID
• If attackers can guess both numbers,
they can poison a DNS sever cache
Application Layer TCP/IP Protocols and
Concepts
• DNSSEC
• Domain Name Server Security
Extensions
• Adds authentication and integrity to
DNS responses
• Uses public key encryption
• No confidentiality
• Like a digital signature
• Slowly being rolled out across the Internet
Online Dig
• Link Ch 5c
RRSIG Contains Signature
Application Layer TCP/IP Protocols and
Concepts
• SNMP
• Simple Network Management Protocol
• Used to monitor and control network devices
• Uses UDP port 161
• SNMPv1 and v2 send "community strings" in
plaintext
• Defaults are "public" and "private"
• SNMPv3 adds encryption; much more secure
• Many networks still use SNMPv2
Application Layer TCP/IP Protocols and
Concepts
• HTTP
• Hypertext Transfer Protocol
• TCP port 80
• No encryption
• HTTPS
• Hypertext Transfer Protocol Secure
• TCP port 443
• Encrypted with SSL/TLS
Application Layer TCP/IP Protocols and
Concepts
• BOOTP
• Bootstrap protocol
• Enables a BIOS to boot from the
network
• BIOS gets an IP address from BOOTP
• Then uses TFTP to load the OS
• Uses ports UDP 67 for servers and UDP
68 for clients
Application Layer TCP/IP Protocols and
Concepts
• DHCP
• Intended to replace BOOTP
• Can deliver IP address, DNS server,
default gateway, and more
• Uses ports UDP 67 for servers and UDP
68 for clients

More Related Content

What's hot

CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsKarthikeyan Dhayalan
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsSam Bowne
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesSam Bowne
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical securityKarthikeyan Dhayalan
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalKarthikeyan Dhayalan
 
CISSP - Chapter 3 - CPU Architecture
CISSP - Chapter 3 - CPU ArchitectureCISSP - Chapter 3 - CPU Architecture
CISSP - Chapter 3 - CPU ArchitectureKarthikeyan Dhayalan
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and TestingSam Bowne
 
CISSP - Software Development Security
CISSP - Software Development SecurityCISSP - Software Development Security
CISSP - Software Development SecurityKarthikeyan Dhayalan
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 
CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfshyedshahriar
 
SOC Certification Runbook Template
SOC Certification Runbook TemplateSOC Certification Runbook Template
SOC Certification Runbook TemplateMark S. Mahre
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Maganathin Veeraragaloo
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 

What's hot (20)

CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
CISSP - Chapter 3 - CPU Architecture
CISSP - Chapter 3 - CPU ArchitectureCISSP - Chapter 3 - CPU Architecture
CISSP - Chapter 3 - CPU Architecture
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
 
CISSP - Software Development Security
CISSP - Software Development SecurityCISSP - Software Development Security
CISSP - Software Development Security
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk Management
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Cism course ppt
Cism course pptCism course ppt
Cism course ppt
 
CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdf
 
SOC Certification Runbook Template
SOC Certification Runbook TemplateSOC Certification Runbook Template
SOC Certification Runbook Template
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
 
Chapter 1 Law & Ethics
Chapter 1   Law & EthicsChapter 1   Law & Ethics
Chapter 1 Law & Ethics
 

Viewers also liked

CISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset SecurityCISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset SecuritySam Bowne
 
CISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development SecurityCISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development SecuritySam Bowne
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)Sam Bowne
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementSam Bowne
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)Sam Bowne
 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingSam Bowne
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)Sam Bowne
 
CNIT 127: Ch 8: Windows overflows (Part 2)
CNIT 127: Ch 8: Windows overflows (Part 2)CNIT 127: Ch 8: Windows overflows (Part 2)
CNIT 127: Ch 8: Windows overflows (Part 2)Sam Bowne
 
CISSP Certification-Asset Security
CISSP Certification-Asset SecurityCISSP Certification-Asset Security
CISSP Certification-Asset SecurityHamed Moghaddam
 
CNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringCNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringSam Bowne
 
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)Sam Bowne
 
Ch 12: Cryptography
Ch 12: CryptographyCh 12: Cryptography
Ch 12: CryptographySam Bowne
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksSam Bowne
 
Ch 13: Network Protection Systems
Ch 13: Network Protection SystemsCh 13: Network Protection Systems
Ch 13: Network Protection SystemsSam Bowne
 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web ServersSam Bowne
 
Security in Data Communication and Networking
Security in Data Communication and NetworkingSecurity in Data Communication and Networking
Security in Data Communication and NetworkingZahidul Hossain
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsSam Bowne
 
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden ThreatCNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden ThreatSam Bowne
 
CNIT 140: Flashing Firmware
CNIT 140: Flashing FirmwareCNIT 140: Flashing Firmware
CNIT 140: Flashing FirmwareSam Bowne
 
CNIT 123: Ch 7: Programming for Security Professionals
CNIT 123: Ch 7: Programming for Security ProfessionalsCNIT 123: Ch 7: Programming for Security Professionals
CNIT 123: Ch 7: Programming for Security ProfessionalsSam Bowne
 

Viewers also liked (20)

CISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset SecurityCISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset Security
 
CISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development SecurityCISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development Security
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and Testing
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
 
CNIT 127: Ch 8: Windows overflows (Part 2)
CNIT 127: Ch 8: Windows overflows (Part 2)CNIT 127: Ch 8: Windows overflows (Part 2)
CNIT 127: Ch 8: Windows overflows (Part 2)
 
CISSP Certification-Asset Security
CISSP Certification-Asset SecurityCISSP Certification-Asset Security
CISSP Certification-Asset Security
 
CNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringCNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social Engineering
 
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
 
Ch 12: Cryptography
Ch 12: CryptographyCh 12: Cryptography
Ch 12: Cryptography
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 
Ch 13: Network Protection Systems
Ch 13: Network Protection SystemsCh 13: Network Protection Systems
Ch 13: Network Protection Systems
 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web Servers
 
Security in Data Communication and Networking
Security in Data Communication and NetworkingSecurity in Data Communication and Networking
Security in Data Communication and Networking
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection Systems
 
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden ThreatCNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
 
CNIT 140: Flashing Firmware
CNIT 140: Flashing FirmwareCNIT 140: Flashing Firmware
CNIT 140: Flashing Firmware
 
CNIT 123: Ch 7: Programming for Security Professionals
CNIT 123: Ch 7: Programming for Security ProfessionalsCNIT 123: Ch 7: Programming for Security Professionals
CNIT 123: Ch 7: Programming for Security Professionals
 

Similar to CISSP Prep: Ch 5. Communication and Network Security (Part 1)

4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network SecuritySam Bowne
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network SecuritySam Bowne
 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewSam Bowne
 
Network protocol
Network protocolNetwork protocol
Network protocolOnline
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial junaidahmedsaba
 
Network_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptxNetwork_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptx20CE112YASHPATEL
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101Sameer Mahajan
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)Sam Bowne
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in detailsapel7
 
tcp ip protocols.ppt
tcp ip protocols.ppttcp ip protocols.ppt
tcp ip protocols.pptssuser3acfba
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-finalTaymoor Nazmy
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...MathivananP4
 

Similar to CISSP Prep: Ch 5. Communication and Network Security (Part 1) (20)

4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts Review
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
ADDRESSING PADA TCP IP
ADDRESSING PADA TCP IPADDRESSING PADA TCP IP
ADDRESSING PADA TCP IP
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Network_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptxNetwork_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptx
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in details
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
tcp ip protocols.ppt
tcp ip protocols.ppttcp ip protocols.ppt
tcp ip protocols.ppt
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
 
Internet
InternetInternet
Internet
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
 
Web technology unit I - Part B
Web technology unit I - Part BWeb technology unit I - Part B
Web technology unit I - Part B
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 

More from Sam Bowne

3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-HellmanSam Bowne
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1Sam Bowne
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android ApplicationsSam Bowne
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3Sam Bowne
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard ProblemsSam Bowne
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)Sam Bowne
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis MethodologySam Bowne
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated EncryptionSam Bowne
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)Sam Bowne
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)Sam Bowne
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream CiphersSam Bowne
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data CollectionSam Bowne
 

More from Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 

Recently uploaded

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 

Recently uploaded (20)

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

CISSP Prep: Ch 5. Communication and Network Security (Part 1)

  • 1. CNIT 125: Information Security Professional (CISSP Preparation) Ch 5. Communication and Network Security (Part 1)
  • 3. Fundamental Network Concepts • Simplex • One-way communication, like an FM radio • Half Duplex • Sends or receives, but not both at once, like a walkie-talkie • Full Duplex • Sends & receives simultaneously, like a telephone
  • 4. Fundamental Network Concepts • Baseband • Whole frequency range dedicated to one signal, like Ethernet • Broadband • Multiple channels, each gets only a portion of the bandwidth • Like broadcast FM radio
  • 5. Fundamental Network Concepts • Analog • Continuous variations of signal • Signal degrades over distance and when repeated • Like a vinyl record • Digital • Signal is a series of zeroes and ones • Can be transmitted and repeated with no loss of accuracy • Like a CD
  • 6. Fundamental Network Concepts • LAN (Local Area Network) • Within a building • MAN (Metropolitan Area Network) • Within a city • WAN (Wide Area Network) • Covering cities, states, or countries • GAN (Global Area Network) • A global collection of WANs • PAN (Personal Area Network) • Devices you carry, often using Bluetooth
  • 7. Fundamental Network Concepts • Internet • Global collection of networks running TCP/IP • Intranet • Privately owned network using TCP/IP • Extranet • Connects private Intranets • Such as connections to business partners
  • 8. Fundamental Network Concepts • Circuit-Switched Network • Dedicated circuit or channel for one connection • Ex: a T1 line between businesses • Packet-Switched Network • Multiple signals share the same lines • Data is broken into packets • Less wasteful and therefore cheaper than circuit switching
  • 9. Fundamental Network Concepts • Quality of Service • Can give specific traffic precedence over other traffic • On a packet-switched network • Ex: VoIP packets get precedence over email packets
  • 10. Fundamental Network Concepts • Layered Design • OSI and TCP/IP models use layers • Each layer performs a specific function • Changes in one layer do not directly affect another layer
  • 11. Fundamental Network Concepts • Network Model • A description of how a network protocol suite operates • Ex: OSI model, TCP/IP model • Network Stack • A network protocol suite programmed in software or hardware • Ex: TCP/IP
  • 12. OSI Model • Mnemonics • Please Do Not Throw Sausage Pizza Away • All People Seem To Need Data Processing
  • 13. Layer 1: Physical • Protocol Data Unit: bit • Physical media that carry signals • Ethernet cables • Radio waves • Fiber optic cables • Devices • Hubs • Repeaters • Cables
  • 14. Layer 2: Data Link • Protocol Data Unit: frame • Uses MAC addresses (for Ethernet) • Devices • Ethernet card • Switch • Bridge
  • 15. Layer 2: Data Link • Two sub-layers • Media Access Control • Connects to layer 1 • Logical Link Control • Connects to layer 3
  • 16. Layer 3: Network • Protocol Data Unit: packet • Performs routing, using IP addresses • Uses IPv4 and/or IPv6 • Device: Router
  • 17. Layer 4: Transport • Protocol Data Unit: Segment • Protocols include UDP and TCP • Uses Port Numbers • TCP is reliable, orders segments, and re- sends undelivered segments
  • 18. Layer 5: Session • Network file shares are mounted at the session layer • For example, you must log in first • Connections between applications
  • 19. Layer 6: Presentation • Presents data to the application layer in a comprehensible way • Data conversion • Character encoding such as ASCII • Image formats like GIF and JPEG • Encryption • Compression
  • 20. Layer 7: Application • Numen-Readable data • Web browser, word processor, IM client • Protocols: • Telnet • FTP • HTTP
  • 22. Network Access Layer • Combines OSI layers 1 and 2 • Includes cable and NIC • Uses MAC addresses
  • 23. Internet Layer • OSI Layer 3 • IP addresses and routing • Uses IPv4 or IPv6
  • 24. Transport Layer • Matches OSI layer 4 • Contains TCP and UDP
  • 25. Application Layer • Combines OSI layers 5-7 • Presents network data to the human user • Like a Web browser
  • 26. Encapsulation • Takes information from a higher layer, and adds a header to it • Like putting a letter in an envelope and addressing it • Layer 4 TCP SEGMENT • Is encapsulated in a Layer 3 IP PACKET • That's encapsulated in a Layer 2 FRAME • Sent over the wire at layer 1 as BITS
  • 27. SPF10 • Segment • Packet • Frame • One and Zero (Bits)
  • 28. Decapsulation • Also called de-multiplexing • Happens at receiving end • The addresses are stripped off the data packets, and the data is delivered to higher levels • BITS are converted to FRAMES • FRAMES are converted to PACKETS • PACKETS are converted to SEGMENTS • SEGMENTS are converted to application data
  • 29. Network Access, Internet and Transport Layer Protocols and Concepts
  • 30. MAC Addresses • Media Access Control address • Unique hardware address of an Ethernet NIC • Burned in at the factory • 48 bits long • First 24 bits form Organizationally Unique Identifier • EUI-64 addresses are 64 bits long • Used in IPv6
  • 31. IPv4 • Internet Protocol version 4 • 32-bit addresses • Written as four bytes in decimal • 192.168.0.1
  • 33. IPv4 Fragmentation • An intermediate router can fragment a packet into smaller packets • To move it onto a network with a smaller maximum transmission unit • "Path MTU Discovery" • Send a large packet with the DF (Don't Fragment) bit set • If it's dropped, try a lower packet size
  • 35. IPv6 Addresses and Autoconfiguration • MAC address used to construct host portion of IPv6 Address • Right 64 bits • fe80:: is the link-local prefix • Public addresses start with 2 or 3
  • 36. IPv6 Security Challenges • Many networks have IPv6 enabled, but the administrators don't understand how to manage it • It can be used for forbidden activity, such as BitTorrent over IPv6
  • 39. Classless Inter-Domain Routing (CIDR) • Allows network sizes between the classes • Class A is /8 16 million hosts • Class B is /16 65,536 - 2 hosts • Class C is /24 256 - 2 hosts • 147.144.96.0/20 • 16 class Cs 2048 - 2 hosts
  • 40. Private IPv4 Addresses • Defined in RFC 1918 • 10.0.0.0 - 10.255.255.255 (10.0.0.0/8) • 172.16.0.0 - 172.31.255.255 (172.16.0.0/12) • 192.168.0.0 - 192.168.255.255 (192.168.0.0/16)
  • 41. Network Address Translation (NAT) • Usually used with Port Address Translation (PAT) • So many clients can share a single public address • Other techniques (rarely used) • Static NAT • One private address to one public address • Pool NAT • A group of public addresses translated one- by-one to the same number of local addresses
  • 43. ARP (Address Resolution Protocol) • Used to find MAC addresses on a LAN • RARP (Reverse Address Resolution Protocol) • An early competitor to DHCP to deliver IP addresses, not common anymore
  • 44. ARP Request and Reply ■ Client wants to find Gateway ■ ARP Request: Who has 192.168.2.1? ■ ARP Reply: ■ MAC: 00-30-bd-02-ed-7b has 192.168.2.1 Client
 Gateway
 Facebook.com ARP Request ARP Reply
  • 45. ARP Poisoning Client
 Gateway
 Facebook.com Attacker
 ARP Replies: I am the Gateway Traffic to Facebook Forwarded & Altered Traffic
  • 46. Unicast and Multicast Traffic • Unicast: One sender to one receiver • Most common • Multicast: One sender to several receivers • Rare, used by routing protocols
  • 47. Broadcast Traffic • One sender to every device on the LAN • Limited broadcast: 255.255.255.255 • Actually sends layer 2 broadcast, to MAC address FF:FF:FF:FF:FF:FF • Directed broadcast: 147.144.255.255 • Was once sent over the Internet • Blocked now to stop smurf attacks
  • 48. Promiscuous Network Access • A NIC in promiscuous mode passes all frames upward for use • Even if they are for a different MAC • Required for Network Intrusion Detection Systems (NIDS) • Entering promiscuous mode requires root privileges • Switches isolate traffic segments • So traffic won't be sent to the wrong MAC address
  • 49. TCP • Transmission Control Protocol • OSI Layer 4
  • 50. TCP Ports • 0-1023: Well-known ports • Require root privileges to listen on • Also called "reserved ports" • 1024 - 65535 • Ephemeral ports • Any user can listen on them
  • 51. Socket • A socket is a combination of four numbers • Source IP and Source Port • Destination IP and Destination Port • Acts like a cable for two-way transmission
  • 52. State • LISTEN • Waiting for a SYN • ESTABLISHED • Handshake complete
  • 53. TCP Flags • URG: Urgent • ACK: Acknowledge • PSH: Push • RST: Reset & • SYN: Synchronize • FIN: Finish • Three new flags added in 2001 & 2003 • CWR: Congestion Window Reduced • ECE: Explicit Congestion Notification Echo • NS: Nonce Sum
  • 55. UDP • User Datagram Protocol • No handshake • No acknowledgements
  • 56. ICMP • Internet Control Message Protocol • Used to troubleshoot and report error conditions • PING • Sends an ICMP Echo Request • Gets an ICMP Echo Reply • Traceroute • Sends packets with low TTL • Tracks ICMP Time Exceeded replies
  • 57.
  • 58. Traceroute • Unix and Cisco send UDP packets • Microsoft sends ICMP packets
  • 59. Application Layer TCP/IP Protocols and Concepts • Telnet • Terminal emulation • Sends command-lines • No encryption • SSH (Secure Shell) • Encrypted replacement for Telnet
  • 60. Application Layer TCP/IP Protocols and Concepts • FTP (File Transfer Protocol) • Sends passwords unencrypted • Uses ports 20 and 21 on the server • Problems for firewalls (link Ch 5b) • Active FTP initiates the port 20 connection from the server, not the client • Passive FTP uses an arbitrary ephemeral port on the server
  • 61. Application Layer TCP/IP Protocols and Concepts • TFTP (Trivial File Transfer Protocol) • Uses UDP port 69 • No authentication at all • No encryption • Used to update firmware in routers and IP phones
  • 62. Application Layer TCP/IP Protocols and Concepts • SSH (Secure Shell) • Secure replacement for Telnet • And FTP and the unix "r" commands • rlogin, rshell, etc. • Includes SFTP and SCP • Can be used as a secure tunnel for other protocols, such as HTTP • Uses TCP port 22 • SSHv1 is old and vulnerable, SSHv2 is the current standard
  • 63. Application Layer TCP/IP Protocols and Concepts • SMTP (Simple Mail Transfer Protocol) • Uses TCP port 25 • Used to send email between servers • POP (Post Office Protocol) • TCP port 110 • Used to download email to a local client like Eudora or Outlook • IMAP (Internet Message Access Protocol) • TCP port 132 • Used to download email to a local client like Eudora or Outlook
  • 64. Application Layer TCP/IP Protocols and Concepts • DNS (Domain Name System) • Uses UDP and TCP 53 • Large responses require TCP 53 • Zone transfers • DNSSEC-signed records • Resolves domain names like ccsf.edu to IP addresses
  • 65. Application Layer TCP/IP Protocols and Concepts • DNS Server Types • SOA (Start of Authority) • Contains the master record for a zone • Recursive server • If it doesn't have the requested data, it will ask other servers • Caching server • Stores recently resolved names
  • 66. Application Layer TCP/IP Protocols and Concepts • DNS Weaknesses • Uses UDP • No authentication • Security relies on a 16-bit source port and a 16-bit DNS query ID • If attackers can guess both numbers, they can poison a DNS sever cache
  • 67. Application Layer TCP/IP Protocols and Concepts • DNSSEC • Domain Name Server Security Extensions • Adds authentication and integrity to DNS responses • Uses public key encryption • No confidentiality • Like a digital signature • Slowly being rolled out across the Internet
  • 70. Application Layer TCP/IP Protocols and Concepts • SNMP • Simple Network Management Protocol • Used to monitor and control network devices • Uses UDP port 161 • SNMPv1 and v2 send "community strings" in plaintext • Defaults are "public" and "private" • SNMPv3 adds encryption; much more secure • Many networks still use SNMPv2
  • 71. Application Layer TCP/IP Protocols and Concepts • HTTP • Hypertext Transfer Protocol • TCP port 80 • No encryption • HTTPS • Hypertext Transfer Protocol Secure • TCP port 443 • Encrypted with SSL/TLS
  • 72. Application Layer TCP/IP Protocols and Concepts • BOOTP • Bootstrap protocol • Enables a BIOS to boot from the network • BIOS gets an IP address from BOOTP • Then uses TFTP to load the OS • Uses ports UDP 67 for servers and UDP 68 for clients
  • 73. Application Layer TCP/IP Protocols and Concepts • DHCP • Intended to replace BOOTP • Can deliver IP address, DNS server, default gateway, and more • Uses ports UDP 67 for servers and UDP 68 for clients