CISSP-2022 Exam Cram Domain 4
CISSP-2022 Exam Cram Domain 4
Communication and
Network Security
D O M A I N 4 : COMMUNICATION & NETWORK SECURITY
For more cybersecurity exam prep tutorials, follow us on Youtube at Inside Cloud and Security
network architectures
network virtualization enabling network
segmentation at high scale.
Throw 4 Transport To
|
Not 3 Network Need
2 Data Link ARP, SLIP, PPP, L2F, L2TP, PPTP, FDDI, ISDN
Domain Name System (DNS) TCP/UDP 53 Border Gateway Protocol TCP 179
(BGP)
Dynamic Host Configuration UDP 67/68
Protocol (DHCP) Lightweight Directory Access TCP/UDP 389
Protocol (LDAP)
Trivial File Transfer Protocol UDP 69
(TFTP) HTTP over SSL/TLS (HTTPS) TCP 443
Hypertext Transfer Protocol TCP 80
LDAP over TLS/SSL TCP/UDP 636
(HTTP)
FTP over TLS/SSL TCP 989/990
Post Office Protocol (POP3) TCP 110
Network Time Protocol (NTP) UDP 123
TCP vs OSI
Link
TCP vs udp
No. TCP UDP
MESH BUS
RING STAR
standard network topologies
Digital
Communications occur through the use of a discontinuous electrical signal and a
state change or on-off pulses.
More reliable than analog signals over long distances or when interference is
present because of a digital signal’s definitive information storage method
Uses current voltage where voltage on represents a value of 1 and voltage off
represents a value of 0. These on-off pulses create a stream of binary data.
synchronous vs asynchronous
Some communications are synchronized with some sort of clock
or timing activity, and are synchronous or asynchronous:
Synchronous
Communications rely on a timing or clocking mechanism based on either
an independent clock or a time stamp embedded in the data stream.
Are typically able to support very high rates of data transfer. example: networking
Asynchronous
Communications rely on a stop and start delimiter bit to manage the
transmission of data.
Best suited for smaller amounts of data.
Broadband
can support multiple simultaneous signals. uses frequency modulation to support
numerous channels,
each supporting a distinct communication session. suitable for high throughput
rates, especially when several channels are multiplexed.
is a form of analog signal. TV, cable modem, ISDN, DSL, T1, T3
broadcast, multicast, unicast
CSMA
does not directly address collisions.
CSMA / CD resends the data frame Whereas CSMA / CA will first transmit the intent to
4
whenever a conflict occurs. send for data transmission.
It is more efficient than simple Is similar to simple CSMA (Carrier Sense Multiple
6
CSMA(Carrier Sense Multiple Access). Access) in terms of efficiency.
token passing, polling
Boosting Performance
can improve performance through an organizational scheme in which
systems that often communicate are located in the same segment, while
systems that rarely or never communicate are located in other segments.
Providing Security
can also improve security by isolating traffic and user access to those
segments where they are authorized.
BLUETOOTH
Bluetooth, or IEEE 802.15, personal area
networks (PANs) are another area of
wireless security concern.
BLUEBUGGING
An attack that grants hackers remote control over the feature and
functions of a Bluetooth device. This could include the ability to turn
on the microphone to use the phone as an audio bug.
wireless technologies (cont)
Version Speed Frequency
Understand FCoE
FCoE (Fibre Channel over Ethernet) is used to encapsulate
Fibre Channel communications over Ethernet networks.
iSCSI
Panel
ANTENNA TYPES
Parabolic
ANTENNA TYPES
Switch
repeats traffic only out of the port on which the destination is known to exist. Switches
offer greater efficiency for traffic delivery, create separate collision domains, and
improve the overall throughput of data. usually layer 2, sometimes layer 3
Routers
used to control traffic flow on networks and are often used to connect similar
networks and control traffic flow between the two. They can function using statically
defined routing tables, or they can employ a dynamic routing system. layer 3
Gateways
a gateway connects networks that are using different network protocols. also known
as protocol translators, can be stand-alone hardware devices or a software service.
network gateways work at layer 3.
network devices
Repeaters, Concentrators, and Amplifiers
used to strengthen the communication signal over a cable segment as well as
connect network segments that use the same protocol. layer 1
Bridges
used to connect two networks (even networks of different topologies, cabling types,
and speeds) in order to connect network segments that use the same protocol. layer 2
Hubs
Hubs were used to connect multiple systems and connect network segments that use
the same protocol. A hub is a multiport repeater. Hubs operate at OSI layer 1. layer 1
LAN Extenders
a remote access, multilayer switch used to connect distant networks over WAN links.
lan & wan technologies
WAN connections and communication links can include private
circuit technologies and packet-switching technologies.
Circuit-Level Firewalls
used to establish communication sessions between trusted partners.
They operate at the Session layer (layer 5) of the OSI model.
one in which the vendor makes the license freely available and allows
access to the source code, though it might ask for an optional donation.
There is no vendor support with open source, so you might pay a third
party to support in a production environment
One of the more popular open-source firewalls is pfsense, the
details for which can be found at https://www.pfsense.org/.
Software based firewalls that you might install on your own hardware.
Provide flexibility to place firewalls anywhere you’d like in your organization.
On servers and workstations, you can run a host-based firewall.
Takes action !
types of ids systems
creates a baseline of activity to identify
normal behavior and then measures system
performance against the baseline to detect
abnormal behavior.
can detect previously unknown attack methods
Fraggle Attack
is a denial-of-service (DoS) attack that involves sending a large amount of spoofed
UDP traffic to a router's broadcast address within a network. It is very similar to a Smurf
Attack, which uses spoofed ICMP traffic using a 3rd party network rather than UDP
traffic to achieve the same goal.
Land Attack
is a Layer 4 Denial of Service (DoS) attack in which, the attacker sets the source and
destination information of a TCP segment to be the same. A vulnerable machine will
crash or freeze due to the packet being repeatedly processed by the TCP stack
network attacks
SYN FlooD
is a form of denial-of-service attack in which an attacker sends a succession
of SYN requests to a target's system in an attempt to consume enough server
resources to make the system unresponsive to legitimate traffic.
Ping of Death
Employs an oversized ping packet. Max allowed ping packet size is 65,536
bytes. Ping of death sends package 65,537 bytes or larger.