SlideShare a Scribd company logo
CISSP:
Network Security
Week 5; Pages 266-315
Part 1
OSI & TCP/IP
OSI and TCP/IP
OSI and TCP/IP
Open System Interconnect Model
● Defined in 1984. Last revision in 1994.
● International Standard (ISO/IEC 7498-1)
● Theoretical way to describe network
structure
● Divided into 7 layers
○ Certain layers require further subdivisions
OSI and TCP/IP
The OSI Layers
1. Physical
a. CAT5 and fiber optic cables
b. Electrical signals
c. Topologies (Star, Bus, Ring)
2. Data-link
a. Logical Link Contol (Error and flow control)
b. Media Access Control (Hardware addressing)
c. Switches
3. Network
a. Internet Protocol (Addressing, Fragmentation)
b. Routers
OSI and TCP/IP
4. Transport
a. TCP & UDP
b. Error Detection and Correction
c. Three-Way Handshake
5. Session
a. Logical Persistent Connection
b. Duplex vs. Simplex
6. Presentation
a. Ensures common formats
b. Complex Architecture
7. Application
a. HTTP, FTP, SMTP, DHCP, etc...
b. Web browser
OSI and TCP/IP
Routing Protocols (under Network Layer)
● RIP v1 & 2 (RFCs 1058, 1723)
○ Uses distance vector to select path w/ fewest
hops; not always fastest; no more than 15 hops
○ v2 supports subnet mask and password
authentication
● OSPF v1 & 2 (RFCs 1131, 1583, 2328)
○ Link-state based
○ smaller, more frequent updates to routing tables
○ supports classless IP ranges
OSI and TCP/IP
● BGP (RFCs 4271, 1771, 1654, 1105, 1163,
1267)
○ for interdomain routing in TCP/IP networks
○ allows the internet to be decentralized
● ICMP (RFC 792)
○ Used heavily in troubleshooting
○ Announces network errors, congestion, and
timeouts
○ Common utilities using this protocol: Ping,
Traceroute
OSI & TCP/IP
TCP Control Bits
● URG - Urgent Pointer field significant
● ACK - Acknowledgement field significant
● PSH - Push Function
● RST - Reset the connection
● SYN - Synchronize sequence numbers
● FIN - No more data from sender
OSI and TCP/IP
Three-Way Handshake
OSI & TCP/IP
Sublayers of Presentation Layer
● CASE
○ provides common application services
○ ACSE, ROSE, CCR, RTSE
● SASE
○ provides specific application services
○ FTAM, VT, MOTIS, CMIP, MMS, RDA, DTP
OSI and TCP/IP
Part 2
IP Networking
IP Networking
Network Addressing
● In 8.24.28.159
○ 8 is network (assigned by orgs like ICANN)
○ .24.28.159 is unique to host
● .0 and .255 are not used by hosts
● Class A: 1.0.0.0 - 127.255.255.254
● Class B: 128.0.0.0 - 191.255.255.254
● Class C: 192.0.0.0 - 223.255.255.254
● Class D: 224. - 239. (for multicast)
● Class E: 240. - 255. (Special purpose)
IP Networking
Network Addressing
● Special networks: 10.0.0.0, 127.0.0.0,
172.16.0.0-172.31.0.0, 192.168.0.0
● Subnets
○ Octets represent bits
○ All bits with a value of 1 are network bits
○ Example: A host in the 172.25.156.0 network with a
subnet mask of 255.255.255.224 means that its
address will be between 172.27.165.1 and
172.27.165.30. Next subnet will start at
172.27.165.32.
IP Networking
CIDR/IPv6
● IP addresses in high demand since '90s
● CIDR introduced to help remedy
○ Classless interdomain (remember BGP?)
● IPv6 currently being introduced
○ Much longer addresses using hexadecimal
○ IPSec implemented
○ Increased throughput
○ Better QoS (meaning better VoIP)
IP Networking
● Connection requires two parts
○ IP Address
○ Ports
● Ports associated with TCP/UDP
● IANA manages standard port numbers
○ 0-1023: well-known; 1024-49151: registered;
49152-65535: private
IP Networking
IP Networking
DHCP
● Allows hosts to get their own IP addresses
● Process is similar to three-way handshake
○ Workstation sends out DHCPDISCOVER
○ Server responds with DHCPOFFER
○ Workstation sends DHCPREQUEST to begin lease
○ Server responds with DHCPACK
● Authentication supported (RFC 3118)
IP Networking
While ICMP is useful, attackers also love it.
● Ping of Death
○ ICMP echo larger than 65,536 bytes would cause
systems to crash; OSs now made to handle it
● Redirect attacks
○ Man-in-the-Middle by redirecting a host through
an attackers computer
● Ping Scanning & Traceroute Exploitation
○ Scanning for open ports/mapping network; NMAP
● IGMP
○ used to manage multicasting groups
IP Networking
● VRRP
○ Performs failover for routers
○ Acts as a virtual router transparently
● RPCs
○ Allows a host to execute code not stored on it
○ CORBA and DCOM are examples
IP Networking
Port 53
RFCs 882, 1034, 1035
IP Networking
Directory Services (Again...)
● LDAP
○ supports lots of back ends
○ weak authentication; transfers in CT
● NetBIOS
● NIS, NIS+
○ Commonly used to manage user credentials
○ NIS does not authenticate between request, NIS+
does
Port 389; RFC 1777
Ports 135, 137, 138, 139; RFCs 1001, 1002
IP Networking
File sharing
● CIFS/SMB/Samba
○ Prevalent on Windows, but also used on Unix-
based systems
○ Capable of user- and tree-level security
○ Credentials sent in CT for backwards compatability
● NFS
○ Prevalent on Unix-type systems, but also found on
Windows.
○ v2 & v3 are stateless protocols for performance
○ Secure NFS uses DES for authentication and
encryption; time stamps for tokens
○ v4 uses Kerberos and is stateful
Port 445
RFCs 1094, 1813, 3010, 3530
IP Networking
● SMTP
○ Routes email
○ No authentication; identification using email
address
○ ESMTP improves security; provides authentication
● FTP
○ Requires two channels: control and data
○ Original: username/password auth passed in CT
○ TLS: sends AUTH TLS command to encrypt session
○ SFTP: encrypts both control and data
○ FTP over SSH: tunneling; only encrypts control
○ Active and Passive: server could be blocked by
firewall
Port 25
Ports 20, 21; RFCs 959, 4217
IP Networking
● Anonymous FTP
○ Replaced with similar HTTP services
○ Considered unsafe due to the need to input an
email address for access
● TFTP
○ Simplified FTP similar in purpose to Anonymous
○ Used on LANs for system administration tasks
Ports 69; RFC 1350
IP Networking
● HTTP
○ Initially "Web enabled" apps caused security
issues
○ No encryption support; simple authentication
● Proxying
○ Anonymizing
■ Allows obfuscation of connection information
○ Open
■ Allows unrestricted access to GET commands
■ Can be used to launch attacks
○ Content Filtering
■ Blocks traffic to restricted sites
■ Protects against accidental downloading of
viruses
Port 80; RFCs 1945, 2109, 2616
Part 3
Implications of
Multi-Layer
Protocols
Multi-Layer Protocols
Typically found used with industrial systems
● SCADA (also called ICS)
○ Control Server - hosts software
○ RTU - equipped with radios
○ HMI - where people control the machines
○ PLC - controls machinery components
○ IED - sensors that collect data
○ IO Server - collects info from RTUs, PLCs, IEDs
○ Data Historian - like SEIM
● Modbus
○ Information sent in clear text
○ No authentication to send commands
Questions?

More Related Content

What's hot

Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2githe26200
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
Nishant Goel
 
Router Network Stimulation Technologies (advanced)
Router Network Stimulation Technologies (advanced)Router Network Stimulation Technologies (advanced)
Router Network Stimulation Technologies (advanced)
MuhammadUsman1853
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and Filtering
Aisha Talat
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
Nzava Luwawa
 
Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2
samis
 
Pertemuan 9 intrusion detection system
Pertemuan 9 intrusion detection systemPertemuan 9 intrusion detection system
Pertemuan 9 intrusion detection system
newbie2019
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3
VISHNU N
 
CCNA/Networking
CCNA/NetworkingCCNA/Networking
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Linux Firewall - NullCon Chennai Presentation
Linux Firewall - NullCon Chennai PresentationLinux Firewall - NullCon Chennai Presentation
Linux Firewall - NullCon Chennai Presentation
Vinoth Sivasubramanan
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
VISHNU N
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
Sylvain Maret
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
VISHNU N
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
LJ PROJECTS
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
Shivam Singh
 
Ccna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 AnswersCcna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 Answers
ccna4discovery
 

What's hot (19)

Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
Router Network Stimulation Technologies (advanced)
Router Network Stimulation Technologies (advanced)Router Network Stimulation Technologies (advanced)
Router Network Stimulation Technologies (advanced)
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and Filtering
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
 
Network Security - Layer 2
Network Security - Layer 2Network Security - Layer 2
Network Security - Layer 2
 
Pertemuan 9 intrusion detection system
Pertemuan 9 intrusion detection systemPertemuan 9 intrusion detection system
Pertemuan 9 intrusion detection system
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3
 
CCNA/Networking
CCNA/NetworkingCCNA/Networking
CCNA/Networking
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Linux Firewall - NullCon Chennai Presentation
Linux Firewall - NullCon Chennai PresentationLinux Firewall - NullCon Chennai Presentation
Linux Firewall - NullCon Chennai Presentation
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
Ccna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 AnswersCcna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 Answers
 

Viewers also liked

CISSP Week 14
CISSP Week 14CISSP Week 14
CISSP Week 14jemtallon
 
CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16jemtallon
 
CISSP Proposal
CISSP ProposalCISSP Proposal
CISSP Proposal
jemtallon
 
Cissp Week 23
Cissp Week 23Cissp Week 23
Cissp Week 23jemtallon
 
CISSP week 26
CISSP week 26CISSP week 26
CISSP week 26jemtallon
 
access-control-week-2
access-control-week-2access-control-week-2
access-control-week-2jemtallon
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3jemtallon
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2
infosecedu
 
Access Control - Week 4
Access Control - Week 4Access Control - Week 4
Access Control - Week 4jemtallon
 
CISSP Week 22
CISSP Week 22CISSP Week 22
CISSP Week 22jemtallon
 
Cissp Week 24
Cissp Week 24Cissp Week 24
Cissp Week 24jemtallon
 
CISSP Week 18
CISSP Week 18CISSP Week 18
CISSP Week 18jemtallon
 
CISSP week 25
CISSP week 25CISSP week 25
CISSP week 25jemtallon
 
CISSP Week 9
CISSP Week 9CISSP Week 9
CISSP Week 9
jemtallon
 
CISSP Week 13
CISSP Week 13CISSP Week 13
CISSP Week 13jemtallon
 
CISSP Week 20
CISSP Week 20CISSP Week 20
CISSP Week 20jemtallon
 
CISSP Week 7
CISSP Week 7CISSP Week 7
CISSP Week 7
jemtallon
 
CISSP Week 12
CISSP Week 12CISSP Week 12
CISSP Week 12jemtallon
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101
Amit Ranjan
 

Viewers also liked (19)

CISSP Week 14
CISSP Week 14CISSP Week 14
CISSP Week 14
 
CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16
 
CISSP Proposal
CISSP ProposalCISSP Proposal
CISSP Proposal
 
Cissp Week 23
Cissp Week 23Cissp Week 23
Cissp Week 23
 
CISSP week 26
CISSP week 26CISSP week 26
CISSP week 26
 
access-control-week-2
access-control-week-2access-control-week-2
access-control-week-2
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2
 
Access Control - Week 4
Access Control - Week 4Access Control - Week 4
Access Control - Week 4
 
CISSP Week 22
CISSP Week 22CISSP Week 22
CISSP Week 22
 
Cissp Week 24
Cissp Week 24Cissp Week 24
Cissp Week 24
 
CISSP Week 18
CISSP Week 18CISSP Week 18
CISSP Week 18
 
CISSP week 25
CISSP week 25CISSP week 25
CISSP week 25
 
CISSP Week 9
CISSP Week 9CISSP Week 9
CISSP Week 9
 
CISSP Week 13
CISSP Week 13CISSP Week 13
CISSP Week 13
 
CISSP Week 20
CISSP Week 20CISSP Week 20
CISSP Week 20
 
CISSP Week 7
CISSP Week 7CISSP Week 7
CISSP Week 7
 
CISSP Week 12
CISSP Week 12CISSP Week 12
CISSP Week 12
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101
 

Similar to CISSP Week 5

Basic ip and networking ver 3 kl
Basic ip and networking ver 3 klBasic ip and networking ver 3 kl
Basic ip and networking ver 3 klAzhar Ali
 
CN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdfCN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdf
ADARSHN40
 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts Review
Sam Bowne
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
Sam Bowne
 
computerNetworkSecurity.ppt
computerNetworkSecurity.pptcomputerNetworkSecurity.ppt
computerNetworkSecurity.ppt
ChandrasekharBehera16
 
210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt
jayvagasiya136
 
CCNA
CCNACCNA
CCNA Exam by quangkien@gmail.com - for CCNA test
CCNA Exam by quangkien@gmail.com - for CCNA testCCNA Exam by quangkien@gmail.com - for CCNA test
CCNA Exam by quangkien@gmail.com - for CCNA test
epro2k71
 
Network.pptx
Network.pptxNetwork.pptx
Network.pptx
SAMANTHACARDOSO13
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
Sam Bowne
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
AnaniaKapala
 
ENC_254_PPT_ch04.pdf
ENC_254_PPT_ch04.pdfENC_254_PPT_ch04.pdf
ENC_254_PPT_ch04.pdf
shaker402
 
Tcp
TcpTcp
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
Jeff Green
 
tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
GreenSignal
 

Similar to CISSP Week 5 (20)

Basic ip and networking ver 3 kl
Basic ip and networking ver 3 klBasic ip and networking ver 3 kl
Basic ip and networking ver 3 kl
 
CN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdfCN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdf
 
Tcpip
TcpipTcpip
Tcpip
 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts Review
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
 
computerNetworkSecurity.ppt
computerNetworkSecurity.pptcomputerNetworkSecurity.ppt
computerNetworkSecurity.ppt
 
210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
CCNA
CCNACCNA
CCNA
 
CCNA Exam by quangkien@gmail.com - for CCNA test
CCNA Exam by quangkien@gmail.com - for CCNA testCCNA Exam by quangkien@gmail.com - for CCNA test
CCNA Exam by quangkien@gmail.com - for CCNA test
 
Network.pptx
Network.pptxNetwork.pptx
Network.pptx
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
ENC_254_PPT_ch04.pdf
ENC_254_PPT_ch04.pdfENC_254_PPT_ch04.pdf
ENC_254_PPT_ch04.pdf
 
Tcp
TcpTcp
Tcp
 
Hardware9
Hardware9Hardware9
Hardware9
 
Tcp
TcpTcp
Tcp
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

CISSP Week 5

  • 2. Part 1 OSI & TCP/IP
  • 4. OSI and TCP/IP Open System Interconnect Model ● Defined in 1984. Last revision in 1994. ● International Standard (ISO/IEC 7498-1) ● Theoretical way to describe network structure ● Divided into 7 layers ○ Certain layers require further subdivisions
  • 5. OSI and TCP/IP The OSI Layers 1. Physical a. CAT5 and fiber optic cables b. Electrical signals c. Topologies (Star, Bus, Ring) 2. Data-link a. Logical Link Contol (Error and flow control) b. Media Access Control (Hardware addressing) c. Switches 3. Network a. Internet Protocol (Addressing, Fragmentation) b. Routers
  • 6. OSI and TCP/IP 4. Transport a. TCP & UDP b. Error Detection and Correction c. Three-Way Handshake 5. Session a. Logical Persistent Connection b. Duplex vs. Simplex 6. Presentation a. Ensures common formats b. Complex Architecture 7. Application a. HTTP, FTP, SMTP, DHCP, etc... b. Web browser
  • 7. OSI and TCP/IP Routing Protocols (under Network Layer) ● RIP v1 & 2 (RFCs 1058, 1723) ○ Uses distance vector to select path w/ fewest hops; not always fastest; no more than 15 hops ○ v2 supports subnet mask and password authentication ● OSPF v1 & 2 (RFCs 1131, 1583, 2328) ○ Link-state based ○ smaller, more frequent updates to routing tables ○ supports classless IP ranges
  • 8. OSI and TCP/IP ● BGP (RFCs 4271, 1771, 1654, 1105, 1163, 1267) ○ for interdomain routing in TCP/IP networks ○ allows the internet to be decentralized ● ICMP (RFC 792) ○ Used heavily in troubleshooting ○ Announces network errors, congestion, and timeouts ○ Common utilities using this protocol: Ping, Traceroute
  • 9. OSI & TCP/IP TCP Control Bits ● URG - Urgent Pointer field significant ● ACK - Acknowledgement field significant ● PSH - Push Function ● RST - Reset the connection ● SYN - Synchronize sequence numbers ● FIN - No more data from sender
  • 11. OSI & TCP/IP Sublayers of Presentation Layer ● CASE ○ provides common application services ○ ACSE, ROSE, CCR, RTSE ● SASE ○ provides specific application services ○ FTAM, VT, MOTIS, CMIP, MMS, RDA, DTP
  • 14. IP Networking Network Addressing ● In 8.24.28.159 ○ 8 is network (assigned by orgs like ICANN) ○ .24.28.159 is unique to host ● .0 and .255 are not used by hosts ● Class A: 1.0.0.0 - 127.255.255.254 ● Class B: 128.0.0.0 - 191.255.255.254 ● Class C: 192.0.0.0 - 223.255.255.254 ● Class D: 224. - 239. (for multicast) ● Class E: 240. - 255. (Special purpose)
  • 15. IP Networking Network Addressing ● Special networks: 10.0.0.0, 127.0.0.0, 172.16.0.0-172.31.0.0, 192.168.0.0 ● Subnets ○ Octets represent bits ○ All bits with a value of 1 are network bits ○ Example: A host in the 172.25.156.0 network with a subnet mask of 255.255.255.224 means that its address will be between 172.27.165.1 and 172.27.165.30. Next subnet will start at 172.27.165.32.
  • 16. IP Networking CIDR/IPv6 ● IP addresses in high demand since '90s ● CIDR introduced to help remedy ○ Classless interdomain (remember BGP?) ● IPv6 currently being introduced ○ Much longer addresses using hexadecimal ○ IPSec implemented ○ Increased throughput ○ Better QoS (meaning better VoIP)
  • 17. IP Networking ● Connection requires two parts ○ IP Address ○ Ports ● Ports associated with TCP/UDP ● IANA manages standard port numbers ○ 0-1023: well-known; 1024-49151: registered; 49152-65535: private
  • 19. IP Networking DHCP ● Allows hosts to get their own IP addresses ● Process is similar to three-way handshake ○ Workstation sends out DHCPDISCOVER ○ Server responds with DHCPOFFER ○ Workstation sends DHCPREQUEST to begin lease ○ Server responds with DHCPACK ● Authentication supported (RFC 3118)
  • 20. IP Networking While ICMP is useful, attackers also love it. ● Ping of Death ○ ICMP echo larger than 65,536 bytes would cause systems to crash; OSs now made to handle it ● Redirect attacks ○ Man-in-the-Middle by redirecting a host through an attackers computer ● Ping Scanning & Traceroute Exploitation ○ Scanning for open ports/mapping network; NMAP ● IGMP ○ used to manage multicasting groups
  • 21. IP Networking ● VRRP ○ Performs failover for routers ○ Acts as a virtual router transparently ● RPCs ○ Allows a host to execute code not stored on it ○ CORBA and DCOM are examples
  • 22. IP Networking Port 53 RFCs 882, 1034, 1035
  • 23. IP Networking Directory Services (Again...) ● LDAP ○ supports lots of back ends ○ weak authentication; transfers in CT ● NetBIOS ● NIS, NIS+ ○ Commonly used to manage user credentials ○ NIS does not authenticate between request, NIS+ does Port 389; RFC 1777 Ports 135, 137, 138, 139; RFCs 1001, 1002
  • 24. IP Networking File sharing ● CIFS/SMB/Samba ○ Prevalent on Windows, but also used on Unix- based systems ○ Capable of user- and tree-level security ○ Credentials sent in CT for backwards compatability ● NFS ○ Prevalent on Unix-type systems, but also found on Windows. ○ v2 & v3 are stateless protocols for performance ○ Secure NFS uses DES for authentication and encryption; time stamps for tokens ○ v4 uses Kerberos and is stateful Port 445 RFCs 1094, 1813, 3010, 3530
  • 25. IP Networking ● SMTP ○ Routes email ○ No authentication; identification using email address ○ ESMTP improves security; provides authentication ● FTP ○ Requires two channels: control and data ○ Original: username/password auth passed in CT ○ TLS: sends AUTH TLS command to encrypt session ○ SFTP: encrypts both control and data ○ FTP over SSH: tunneling; only encrypts control ○ Active and Passive: server could be blocked by firewall Port 25 Ports 20, 21; RFCs 959, 4217
  • 26. IP Networking ● Anonymous FTP ○ Replaced with similar HTTP services ○ Considered unsafe due to the need to input an email address for access ● TFTP ○ Simplified FTP similar in purpose to Anonymous ○ Used on LANs for system administration tasks Ports 69; RFC 1350
  • 27. IP Networking ● HTTP ○ Initially "Web enabled" apps caused security issues ○ No encryption support; simple authentication ● Proxying ○ Anonymizing ■ Allows obfuscation of connection information ○ Open ■ Allows unrestricted access to GET commands ■ Can be used to launch attacks ○ Content Filtering ■ Blocks traffic to restricted sites ■ Protects against accidental downloading of viruses Port 80; RFCs 1945, 2109, 2616
  • 29. Multi-Layer Protocols Typically found used with industrial systems ● SCADA (also called ICS) ○ Control Server - hosts software ○ RTU - equipped with radios ○ HMI - where people control the machines ○ PLC - controls machinery components ○ IED - sensors that collect data ○ IO Server - collects info from RTUs, PLCs, IEDs ○ Data Historian - like SEIM ● Modbus ○ Information sent in clear text ○ No authentication to send commands