telecommunications and network security

119
Telecommunications and Network Security CISSP Guide to Security Essentials Chapter 10

Upload: archie

Post on 23-Feb-2016

68 views

Category:

Documents


1 download

DESCRIPTION

Telecommunications and Network Security. CISSP Guide to Security Essentials Chapter 10. Objectives. Wireline and wireless telecommunication technologies Wired and wireless network technologies Network topologies and cabling The OSI and TCP/IP network models. Objectives (cont.). - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Telecommunications and Network Security

Telecommunications and Network Security

CISSP Guide to Security EssentialsChapter 10

Page 2: Telecommunications and Network Security

CISSP Guide to Security Essentials 2

Objectives

• Wireline and wireless telecommunication technologies

• Wired and wireless network technologies • Network topologies and cabling• The OSI and TCP/IP network models

Page 3: Telecommunications and Network Security

CISSP Guide to Security Essentials 3

Objectives (cont.)

• TCP/IP networks, protocols, addressing, devices, routing, authentication, access control, tunneling, and services

• Network based threats, attacks, vulnerabilities, and countermeasures

Page 4: Telecommunications and Network Security

CISSP Guide to Security Essentials 4

Wired Telecom Technologies

• DS-1, aka T-1– 24 voice or data channels, each

1.544 Mbit/sec• Other T-carrier protocols

– DS-3 (673 voice channels, 45mBit/s)– DS-4 (4,032 channels, 274mBit/s)– DS-5 (5,760 channels, 400mBit/s)

Page 5: Telecommunications and Network Security

CISSP Guide to Security Essentials 5

Wired Telecom Technologies (cont.)

• E-1 – Euro version– 32 channels instead of 24, otherwise similar

• SONET (Synchronous Optical NETwork)– High speed, fiber optic, encapsulates

T-protocols, ATM, TCP/IP– OC-1 - 48.960 Mbit/sec

Page 6: Telecommunications and Network Security

CISSP Guide to Security Essentials 6

Wired Telecom Technologies (cont.)

• SONET (cont.)– OC-3 - 150.336 Mbit/sec– OC-12 - 601.344 Mbit/sec– OC-24 - 1,202.688 Mbit/sec

Page 7: Telecommunications and Network Security

CISSP Guide to Security Essentials 7

Wired Telecom Technologies (cont.)

• SONET (cont.)– OC-48 - 2,405.376 Mbit/sec– OC-96 - 4,810.752Mbit/sec– OC-192 - 9,621.504 Mbit/sec

Page 8: Telecommunications and Network Security

CISSP Guide to Security Essentials 8

Wired Telecom Technologies (cont.)

• Frame Relay– Link layer protocol *– Early packet-switched technology that used

to transmit data between locations at a lower cost than dedicated DS-1 circuits

– Switched Virtual Circuits (SVCs) and Permanent Virtual Circuits (PVCs) emulate dedicated T-1

* - discussed later in this chapter

Page 9: Telecommunications and Network Security

CISSP Guide to Security Essentials 9

Wired Telecom Technologies (cont.)

• ATM (Asynchronous Transfer Mode)– Synchronous, connection-oriented packet protocol– Packets called cells, are fixed length

(5 byte header, 48 byte payload)

Page 10: Telecommunications and Network Security

CISSP Guide to Security Essentials 10

Wired Telecom Technologies (cont.)

• ATM (cont.)– Intended to replace 10mB Ethernet, but

it didn’t really catch on. 100mB and 1000mB Ethernet was favored instead, also giving way to MPLS.

Page 11: Telecommunications and Network Security

CISSP Guide to Security Essentials 11

Wired Telecom Technologies (cont.)

• DSL (Digital Subscriber Line)– Digital packet over copper voice circuits

at higher clock rate, coexists with low frequency voice

Page 12: Telecommunications and Network Security

CISSP Guide to Security Essentials 12

Wired Telecom Technologies (cont.)

• DSL (cont.)– Modem used on subscriber side to convert DSL

signals to Ethernet (and sometimes Wi-Fi)– DSLAM (Digital Subscriber Line Access Multiplexer)

on telco end aggregates signals

Page 13: Telecommunications and Network Security

CISSP Guide to Security Essentials 13

Wired Telecom Technologies (cont.)

• MPLS (Multiprotocol Label Switching)– Packet switched technology, encapsulates TCP/IP,

ATM, SONET, Ethernet frames)– Carries voice + data, has QoS (quality of service)

capabilities to guarantee jitter-free voice and other media such as video

– Replacing Frame Relay and ATM

Page 14: Telecommunications and Network Security

CISSP Guide to Security Essentials 14

Wired Telecom Technologies (cont.)

• Other wired telecom technologies– Data Over Cable Service Interface Specification

(DOCSIS)– PSTN (Public Switched Telephone Network)– ISDN (Integrated Services Digital Network)– SDH (Synchronous Digital Hierarchy)– X.25

Page 15: Telecommunications and Network Security

CISSP Guide to Security Essentials 15

Wireless Telecom Technologies

• CDMA2000 (code division multiple access)– Data transport: 1XRTT (153 kbit/s), EVDO (2.4

Mbit/s), EVDV (3.1 Mbit/s)• GPRS (General Packet Radio Service)

– Encapsulated in GSM (Global System for Mobile communications) protocol (114kbit/s)

Page 16: Telecommunications and Network Security

CISSP Guide to Security Essentials 16

Wireless Telecom Technologies (cont.)

• EDGE (Enhanced Data rates for GSM Evolution)– Up to 1Mbit/s

• UMTS (Universal Mobile Telecommunications System)– Transported over WCDMA, up to 14Mbit/s)

Page 17: Telecommunications and Network Security

CISSP Guide to Security Essentials 17

Wireless Telecom Technologies (cont.)

• WiMAX (Worldwide Interoperability for Microwave Access)– Based on IEEE 802.16, WiMAX is

a wireless competitor to DSL and cable modems, also competes with CDMA, GPRS, EDGE, UMTS

Page 18: Telecommunications and Network Security

CISSP Guide to Security Essentials 18

Wireless Telecom Technologies (cont.)

• WiMAX (cont.)– Rates range from 2 to 12 Mbit/s,

theoretically as high as 70 Mbit/s• CDPD (Cellular Digital Packet Data)

– first data over cellular, used AMPS analog carrier, up to 19.2 kbit/s

Page 19: Telecommunications and Network Security

CISSP Guide to Security Essentials 19

Wired Network Technologies

• Ethernet– Frame-based protocol

• 14 byte header• Payload (46-1500 bytes)• Checksum• Inter-frame gap

Page 20: Telecommunications and Network Security

CISSP Guide to Security Essentials 20

Wired Network Technologies (cont.)

• Ethernet (cont.)– Error detection: Carrier Sense Multiple Access

with Collision Detection (CSMA/CD)– MAC address: 6 bytes. Format xx.xx.xx.yy.yy.yy.

• xx.xx.xx assigned to manufacturer

Page 21: Telecommunications and Network Security

CISSP Guide to Security Essentials 21

Wired Network Technologies (cont.)

• Ethernet devices– Hub – connects local stations together; broadcast– Repeater – extend signal over distances– Switch – like a hub but does not

broadcast

Page 22: Telecommunications and Network Security

CISSP Guide to Security Essentials 22

Wired Network Technologies (cont.)

• Ethernet devices (cont.)– Router – connect networks to each other– Gateway – translates various types of

communications

Page 23: Telecommunications and Network Security

CISSP Guide to Security Essentials 23

Wired Network Technologies (cont.)

• Token ring– Logical ring– Speed: 4Mbit/s and 16Mbit/s– Mostly replaced by Ethernet

Page 24: Telecommunications and Network Security

CISSP Guide to Security Essentials 24

Wired Network Technologies (cont.)

• Universal Serial Bus (USB)– Successor to RS-232 serial– Speeds

• USB 1.0/1.1 – 1.5Mbits/s and 12Mbits/s• USB 2.0 – 480Mbits/s• USB 3.0 – 4.8Gbits/s

Page 25: Telecommunications and Network Security

CISSP Guide to Security Essentials 25

Wired Network Technologies (cont.)

• Universal Serial Bus (cont.)– Hot pluggable– Used to connect peripheral and human

interface devices

Page 26: Telecommunications and Network Security

CISSP Guide to Security Essentials 26

Wired Network Technologies (cont.)

• RS-232– Serial communications, speeds 110bit/s – 57.7kbit/s– Used to connect communications devices such as

modems, and human interface devices such as mice– Largely replaced by USB

Page 27: Telecommunications and Network Security

CISSP Guide to Security Essentials 27

Wired Network Technologies (cont.)

• HSSI (High Speed Serial Interface) – 52Mbits/s, cable length 50’, used to

connect WAN devices• Fibre Channel

– Gigabit protocol used in SANs (Storage Area Networks)

Page 28: Telecommunications and Network Security

CISSP Guide to Security Essentials 28

Wired Network Technologies (cont.)

• FDDI (Fiber Distributed Data Interface) – Token technology over fiber that has

been replaced by gigabit Ethernet and SONET

Page 29: Telecommunications and Network Security

CISSP Guide to Security Essentials 29

Wired Network Technologies (cont.)

• Network cabling– Ethernet

• 10BASE-T – this is the commonly twisted-pair network cable that supports the Category 3, 5, or 6 ANSI standard. This cable…

Page 30: Telecommunications and Network Security

CISSP Guide to Security Essentials 30

Wired Network Technologies (cont.)

• 10BASE-T (cont.) …has 8 conductors, of which 4 are used. An 8-pin RJ45 connector is used to connect a cable to a device.

Page 31: Telecommunications and Network Security

CISSP Guide to Security Essentials 31

Wired Network Technologies (cont.)

– Ethernet (cont.)• 100BASE-TX – the same twisted-pair network

cable (Category 5 and 6) and connectors as 10BASE-T, and also uses just 4 of the 8 conductors

Page 32: Telecommunications and Network Security

CISSP Guide to Security Essentials 32

Wired Network Technologies (cont.)

– Ethernet (cont.)• 1000BASE-T – the same twisted-pair network

cable and connectors as 100BASE-TX, except that all 8 conductors are used.

Page 33: Telecommunications and Network Security

CISSP Guide to Security Essentials 33

Wired Network Technologies (cont.)

– Ethernet (cont.)• 10BASE2 – the old “thinnet” coaxial cabling

with twist-lock BNC connectors – rarely used.• 10BASE5 – the old “thicknet” coaxial cabling

that is rarely used.

Page 34: Telecommunications and Network Security

CISSP Guide to Security Essentials 34

Wired Network Technologies (cont.)

• Twisted pair cabling– Category 3 – consists of four twisted pairs in a

single jacket. Suitable only for 10Mbit/s Ethernet. Superseded by Category 5 and 5e.

Page 35: Telecommunications and Network Security

CISSP Guide to Security Essentials 35

Wired Network Technologies (cont.)

• Twisted pair cabling (cont.)– Category 5 – consists of four twisted

pairs in a single jacket. Maximum length is 100m. Suitable for 100Mbit/s and can be used for Gigabit Ethernet.

Page 36: Telecommunications and Network Security

CISSP Guide to Security Essentials 36

Wired Network Technologies (cont.)

• Twisted pair cabling (cont.)– Category 5e – supersedes Category 5 and

includes specifications for far end crosstalk.– Category 6 – backward compatible with Category

5 and 5e, but higher specifications for noise and crosstalk, making it more suitable for Gigabit Ethernet.

Page 37: Telecommunications and Network Security

CISSP Guide to Security Essentials 37

Wired Network Technologies (cont.)

• Twisted pair cabling (cont.)– Category 7 – even more stringent than

Category 6 cabling, Cat-7 is suitable for 10Gbit/s networks.

Page 38: Telecommunications and Network Security

CISSP Guide to Security Essentials 38

Wired Network Technologies (cont.)

• Cabling – Optical

• Carries signal in the form of light instead of electricity• Greater speeds and distances possible• More expensive

Page 39: Telecommunications and Network Security

CISSP Guide to Security Essentials 39

Network Topologies

• Bus. All of the nodes in the network are connected to a single conductor. A break in the network conductor will cause some or the entire network to stop functioning. Early Ethernet networks consisting of thinnet coaxial cabling were bus networks.

Page 40: Telecommunications and Network Security

CISSP Guide to Security Essentials 40

Network Topologies (cont.)

• Ring. All of the nodes are connected to exactly two other nodes, forming a circular loop. Breaking any conductor will cause the network to stop functioning.

• Star. All nodes are connected to a central device. A break in a conductor…

Page 41: Telecommunications and Network Security

CISSP Guide to Security Essentials 41

Network Topologies (cont.)

• Star. (cont.) …will disconnect only one node, and the remaining nodes will continue functioning. Ethernet networks are physical stars, with computers connected to central hubs or switches. Token ring networks, while logically as a ring, are physically wired as a star.

Page 42: Telecommunications and Network Security

CISSP Guide to Security Essentials 42

Wireless Network Technologies

• Wi-Fi, also known as WLAN, Wireless LAN– Wireless data link layer network protocol– Bandwidth up to 54Mbit/s, distances to 100m

Page 43: Telecommunications and Network Security

CISSP Guide to Security Essentials 43

Wireless Network Technologies (cont.)

Standard Spectrum Data Rate Range Released802.11a 5 GHz 54 Mbit/s 120 m 1999802.11b 2.4 GHz 11 Mbit/s 140 m 1999802.11g 2.4 GHz 54 Mbit/s 140 m 2003802.11n 2.4/5 GHz 248 Mbit/s 250 m 2009802.11y 3.7 GHz 54 Mbit/s 5000 m 2008

• Wi-Fi standards

Page 44: Telecommunications and Network Security

CISSP Guide to Security Essentials 44

Wireless Network Technologies (cont.)

• Wi-Fi security– SSID should be a non-default value– SSID broadcast should be disabled– MAC access control

Page 45: Telecommunications and Network Security

CISSP Guide to Security Essentials 45

Wireless Network Technologies (cont.)

• Wi-Fi security (cont.)– Authentication– Encryption

• WEP (Wired Equivalent Privacy)• WPA (Wireless Protected Access)• WPA2 (superset of WPA, full standard)

Page 46: Telecommunications and Network Security

CISSP Guide to Security Essentials 46

Wireless Network Technologies (cont.)

• Bluetooth– Personal Area Network (PAN) technology– Data rate: 1Mbit/s – 3Mbit/s – Distance: up to 10 m

Page 47: Telecommunications and Network Security

CISSP Guide to Security Essentials 47

Wireless Network Technologies (cont.)

• Bluetooth (cont.)– Devices can authenticate through a process

called “pairing”, during which two devices can exchange a cryptographic secret key that the two devices can later use

Page 48: Telecommunications and Network Security

CISSP Guide to Security Essentials 48

Wireless Network Technologies (cont.)

• Bluetooth (cont.)– Communications between paired devices can

also be encrypted

Page 49: Telecommunications and Network Security

CISSP Guide to Security Essentials 49

Wireless Network Technologies (cont.)

• IrDA– Infrared Data Association standard– Infrared light spectrum from 2.4kbit/s to 16Mbit/s

• Requires line-of-sight – Once popular, now being replaced with Bluetooth

Page 50: Telecommunications and Network Security

CISSP Guide to Security Essentials 50

Wireless Network Technologies (cont.)

• Wireless USB (WUSB)– Wireless protocol designed for wireless connectivity

of various computer peripherals• Printers, digital cameras, hard disks, and

other high-throughput devices.

Page 51: Telecommunications and Network Security

CISSP Guide to Security Essentials 51

Wireless Network Technologies (cont.)

• Wireless USB (cont.)– Bandwidth ranges from 110 Mbit/s at 10

meters to 480 Mbit/s at 3 meters– 3.1 to 10.6 GHz frequency range

Page 52: Telecommunications and Network Security

CISSP Guide to Security Essentials 52

Wireless Network Technologies (cont.)

• Near Field Communication (NFC)– Ultra-short distance (up to 10cm or 4”)– Rates: 106 kbit/s, 212 kbit/s, or 424 kbit/s – Active or passive mode

• Passive mode ideal for key card access control

Page 53: Telecommunications and Network Security

CISSP Guide to Security Essentials 53

OSI Protocol Model

• Physical• Data link• Network• Transport• Session• Presentation• Application

Page 54: Telecommunications and Network Security

CISSP Guide to Security Essentials 54

OSI Protocol Model: Physical

• Concerned with a network’s physical media– Electrical– Optical– Radio frequency

Page 55: Telecommunications and Network Security

CISSP Guide to Security Essentials 55

OSI Protocol Model: Physical (cont.)

• Example standards– RS-232, RS-422, T1, E1, 10Base-T, SONET,

DSL, 802.11a (physical), Twinax

Page 56: Telecommunications and Network Security

CISSP Guide to Security Essentials 56

OSI Protocol Model: Data Link

• Concerned with the transfer of data between nodes

• Manages error correction for any errors that take place at the physical layer

Page 57: Telecommunications and Network Security

CISSP Guide to Security Essentials 57

OSI Protocol Model: Data Link (cont.)

• Example standards– 802.3 (Ethernet), 802.11a MAC, GPRS, AppleTalk,

ATM, FDDI, Fibre Channel, Frame Relay, PPP, SLIP, Token Ring, Wi-MAX

Page 58: Telecommunications and Network Security

CISSP Guide to Security Essentials 58

OSI Protocol Model: Network

• Used to transport variable-length data sequences between nodes

• Manages fragmentation and reassembly• Communications are point-to-point

Page 59: Telecommunications and Network Security

CISSP Guide to Security Essentials 59

OSI Protocol Model: Network (cont.)

• No notion of a “connection” • Delivery of data not done here• Example standards

– IP, ICMP, ARP, IPX

Page 60: Telecommunications and Network Security

CISSP Guide to Security Essentials 60

OSI Protocol Model: Transport

• Manages the delivery of data from node to node on a network– Even when there are intermediate devices

such as routers and a variety of physical media between the nodes

Page 61: Telecommunications and Network Security

CISSP Guide to Security Essentials 61

OSI Protocol Model: Transport (cont.)

• Manages the delivery of data from node to node on a network (cont.)– Manages “connections”

• Guarantee the order of delivery of data packets, packet reassembly, error recovery

– Examples: UDP, TCP, IPsec, PPTP, L2TP, SPX

Page 62: Telecommunications and Network Security

CISSP Guide to Security Essentials 62

OSI Protocol Model: Session

• Manages connections between nodes, including session establishment, communication, and teardown

• Example standards– NetBIOS, TCP, SIP

Page 63: Telecommunications and Network Security

CISSP Guide to Security Essentials 63

OSI Protocol Model: Presentation

• Deals with the presentation or representation of data in a communications session– Character set translation– Compression– Encryption

Page 64: Telecommunications and Network Security

CISSP Guide to Security Essentials 64

OSI Protocol Model: Presentation (cont.)

• Examples of presentation - layer standards include SSL, TLS, MIME, and MPEG

Page 65: Telecommunications and Network Security

CISSP Guide to Security Essentials 65

OSI Protocol Model: Application

• Top-most layer in the OSI network model

• Concerned with the delivery of data to and from applications

• Examples standards– DNS, NFS, NTP, DHCP, SMTP, HTTP,

SNMP, SSH, Telnet, WHOIS

Page 66: Telecommunications and Network Security

CISSP Guide to Security Essentials 66

TCP/IP Protocol Model

• Physical• Data link• Network / internet• Transport• Application

Page 67: Telecommunications and Network Security

CISSP Guide to Security Essentials 67

TCP/IP Protocol Model: Physical• Physical medium used to carry traffic

– Twisted pair cable– Coaxial cable– Optical fiber– SONET

Page 68: Telecommunications and Network Security

CISSP Guide to Security Essentials 68

TCP/IP Protocol Model: Physical (cont.)

• Physical medium (cont.)– T-1 and E-1 telecommunications links– DSL– ISDN– Wi-Fi

Page 69: Telecommunications and Network Security

CISSP Guide to Security Essentials 69

TCP/IP Protocol Model: Physical (cont.)

• Physical medium (cont.)– Bluetooth– USB– GPRS– CDMA

Page 70: Telecommunications and Network Security

CISSP Guide to Security Essentials 70

TCP/IP Protocol Model: Data Link

• Concerned with node to node delivery• Example standards

– Wi-Fi– Ethernet– Token Ring

Page 71: Telecommunications and Network Security

CISSP Guide to Security Essentials 71

TCP/IP Protocol Model: Data Link (cont.)

• Example standards (cont.)– ATM– Frame Relay– PPP

Page 72: Telecommunications and Network Security

CISSP Guide to Security Essentials 72

TCP/IP Protocol Model: Network

• Also known as the Internet layer• Concerned with end-to-end packet

delivery, even through intermediate devices such as switches and routers

Page 73: Telecommunications and Network Security

CISSP Guide to Security Essentials 73

TCP/IP Protocol Model: Network (cont.)

• Protocols– IPv4– IPv6– ARP– RARP

Page 74: Telecommunications and Network Security

CISSP Guide to Security Essentials 74

TCP/IP Protocol Model: Network (cont.)

• Protocols (cont.)– ICMP– IGMP– IPsec

Page 75: Telecommunications and Network Security

CISSP Guide to Security Essentials 75

TCP/IP Protocol Model: Network (cont.)

• Network layer routing protocols– RIP– OSPF– IS-IS– BGP

Page 76: Telecommunications and Network Security

CISSP Guide to Security Essentials 76

TCP/IP Protocol Model: Network (cont.)

• Network layer addressing– Network addresses in IPv4 are 32

bits in length• Expressed as a dot-decimal notation,

xx.xx.xx.xx, where the range of each ‘xx’ is 0-255 decimal.

• Typical network address is 141.204.13.200

Page 77: Telecommunications and Network Security

CISSP Guide to Security Essentials 77

TCP/IP Protocol Model: Network (cont.)

• Network layer addressing (cont.)– Subnets and subnet masking

• IP address divided into two parts: network and node

• Subnet mask used to distinguish network and node portions; e.g. 255.255.255.0

Page 78: Telecommunications and Network Security

CISSP Guide to Security Essentials 78

TCP/IP Protocol Model: Network (cont.)

• Network layer addressing (cont.)– Default gateway – node that connects to other

networks– Address allocation by Regional Internet Registry

(RIR), ISPs

Page 79: Telecommunications and Network Security

CISSP Guide to Security Essentials 79

TCP/IP Protocol Model: Network (cont.)

• Network layer addressing (cont.)– Reserved address blocks

• Private networks– 10.0.0.0 – 10.255.255.255– 172.16.0.0 - 172.31.255.255– 192.168.0.0 - 192.168.255.255

Page 80: Telecommunications and Network Security

CISSP Guide to Security Essentials 80

TCP/IP Protocol Model: Network (cont.)

• Network layer addressing (cont.)– Reserved address blocks (cont.)

• Loopback: 127.0.0.1 - 127.0.0.255 (127.0.0.1 = “me”)• Multicast: 224.0.0.0-239.255.255.255

Page 81: Telecommunications and Network Security

CISSP Guide to Security Essentials 81

TCP/IP Protocol Model: Network (cont.)

• Network layer addressing (cont.)– Network address translation (NAT)

• Internal private addresses are translated into public routable addresses at the network boundary

Page 82: Telecommunications and Network Security

CISSP Guide to Security Essentials 82

TCP/IP Protocol Model: Network (cont.)

• Network layer addressing (cont.)– Classful networks

• Class A• Class B• Class C

Page 83: Telecommunications and Network Security

CISSP Guide to Security Essentials 83

TCP/IP Protocol Model: Network (cont.)

• Network layer addressing (cont.)– Classless networks (Classless Internet Domain

Routing (CIDR)• Variable length subnet masks, not limited

to just Class A, B, C

Page 84: Telecommunications and Network Security

CISSP Guide to Security Essentials 84

TCP/IP Protocol Model: Network (cont.)

• Network layer addressing (cont.)– Types of addressing

• Unicast (regular node addresses)• Broadcast (send to all nodes on

a subnet)

Page 85: Telecommunications and Network Security

CISSP Guide to Security Essentials 85

TCP/IP Protocol Model: Network (cont.)

– Types of addressing (cont.)• Multicast (send to a group of notes on different

networks)• Anycast (send to only one of a group of nodes)

Page 86: Telecommunications and Network Security

CISSP Guide to Security Essentials 86

TCP/IP Protocol Model: Transport

• TCP Protocol– Connection oriented, persistent connections,

dedicated and ephemeral ports, sequencing, guaranteed delivery

– Examples: FTP, HTTP, Telnet

Page 87: Telecommunications and Network Security

CISSP Guide to Security Essentials 87

TCP/IP Protocol Model: Transport (cont.)

• UDP Protocol– Connectionless, dedicated port numbers only, no

sequencing, no guarantee of delivery– Examples: DNS, TFTP, VoIP

Page 88: Telecommunications and Network Security

CISSP Guide to Security Essentials 88

TCP/IP Protocol Model: Application

• Topmost layer in the TCP/IP protocol stack

• Protocols: DHCP, DNS, Finger, FTP, HTTP, LDAP, NFS, NIS, NTP, Rlogin, RPC, Rsh, SIP, SMTP, SNMP, Telnet, TFTP, VoIP, Whois

Page 89: Telecommunications and Network Security

CISSP Guide to Security Essentials 89

TCP/IP Routing Protocols

• Router-to-router communication protocol used by routers to help determine the most efficient network routes between two nodes on a network

• Helps routers make good routing decisions (making the right choice about which way to forward packets)

Page 90: Telecommunications and Network Security

CISSP Guide to Security Essentials 90

TCP/IP Routing Protocols (cont.)

• RIP (Routing Information Protocol) – one of the early routing protocols– Hop count the primary metric, maximum = 15

• IGRP (Interior Gateway Routing Protocol) – Cisco proprietary– Multiple metrics: hop count (max 255),

bandwidth, delay, load, MTU, and reliability

Page 91: Telecommunications and Network Security

CISSP Guide to Security Essentials 91

TCP/IP Routing Protocols (cont.)• EIGRP (Enhanced Interior Gateway

Routing Protocol) – Cisco proprietary– Advances over IGRP including VLSM

• OSPF (Open Shortest Path First) – Open standard for enterprise networks– Metric is “path cost” (primarily hops and speed)– Uses authentication to prevent route spoofing

Page 92: Telecommunications and Network Security

CISSP Guide to Security Essentials 92

TCP/IP Routing Protocols (cont.)• BGP (Border Gateway Protocol) – the

dominant Internet routing algorithm• IS-IS (Intermediate system to

intermediate system) – used primarily by large ISP networks

Page 93: Telecommunications and Network Security

CISSP Guide to Security Essentials 93

Remote Access / Tunneling Protocols

• Tunneling: encapsulating packets of one protocol within another – can include encryption– Reasons: protection of encapsulated protocol; hide

details of intermediary network, authentication of traffic

Page 94: Telecommunications and Network Security

CISSP Guide to Security Essentials 94

Remote Access / Tunneling Protocols (cont.)

• Tunneling: (cont.)– Protocols

• VPN – generic term for tunneled (and usually encrypted) network connection from a public network to a private network

Page 95: Telecommunications and Network Security

CISSP Guide to Security Essentials 95

Remote Access / Tunneling Protocols (cont.)

– Protocols (cont.)• SSL / TLS• SSH• IPsec• Others: L2TP, PPP, PPTP, SLIP

Page 96: Telecommunications and Network Security

CISSP Guide to Security Essentials 96

Authentication Protocols

• RADIUS (Remote Authentication Dial In User Service)– Over-the-wire protocol from client

to AAA (authentication, authorization, accounting) server

• Diameter – more advanced RADIUS replacement

Page 97: Telecommunications and Network Security

CISSP Guide to Security Essentials 97

Authentication Protocols (cont.)

• TACACS (Terminal Access Controller Access-Control System) – authenticates user to a network.– Between access point or gateway and

an AAA server• 802.1X – port level access control. System

authenticates before user.

Page 98: Telecommunications and Network Security

CISSP Guide to Security Essentials 98

Authentication Protocols (cont.)

• CHAP (Challenge-Handshake Authentication Protocol)– Between client system and gateway

• PPP uses CHAP

Page 99: Telecommunications and Network Security

CISSP Guide to Security Essentials 99

Authentication Protocols (cont.)

• EAP (Extensible Authentication Protocol)– Authentication Framework – used to authenticate

users in wired and wireless networks. Used by WPA and WPA2 wireless network standards.

Page 100: Telecommunications and Network Security

CISSP Guide to Security Essentials 100

Authentication Protocols (cont.)

• PEAP (Protected Extensible Authentication Protocol)– used in wireless networks to authenticate users– PEAP uses an SSL/TLS tunnel to encrypt

authentication information• PAP (Password Authentication Protocol)

– unsecure because protocol is unencrypted

Page 101: Telecommunications and Network Security

CISSP Guide to Security Essentials 101

Network Threats

• The expressed potential for the occurrence of a harmful event such as an attack– DoS / DDoS – designed to flood or

cause malfunction– Teardrop - attacker sends mangled packet fragments

with overlapping and oversized payloads to a target system

Page 102: Telecommunications and Network Security

CISSP Guide to Security Essentials 102

Network Threats (cont.)

• Threats (cont.)– Sequence number – guesses upcoming sequence

numbers as a method for disrupting communications– Smurf - large number of forged ICMP echo requests.

The packets are sent to a target network’s broadcast address, which causes all systems on the network to respond

Page 103: Telecommunications and Network Security

CISSP Guide to Security Essentials 103

Network Threats (cont.)

• Threats (cont.)– Ping of Death – ICMP echo request, 64k length– SYN flood – large volume of TCP SYN packets,

consumes resources on target system– Worm – automated, self-replicating program

Page 104: Telecommunications and Network Security

CISSP Guide to Security Essentials 104

Network Threats (cont.)

• Threats (cont.)– Spam – unsolicited commercial e-mail (UCE): fraud,

malware, marketing– Phishing – emails luring users to fraudulent sites– Pharming – attack on DNS that redirects access to

legitimate sites to imposter sites

Page 105: Telecommunications and Network Security

CISSP Guide to Security Essentials 105

Network Vulnerabilities

• Unnecessary open ports• Unpatched systems• Poor and outdated configurations• Exposed cabling

Page 106: Telecommunications and Network Security

CISSP Guide to Security Essentials 106

Network Countermeasures

• Access control lists• Firewalls• Intrusion Detection System (IDS)

– Network based (NIDS)– Host based (HIDS)

Page 107: Telecommunications and Network Security

CISSP Guide to Security Essentials 107

Network Countermeasures (cont.)

• Intrusion Prevention System (IPS)– Network and host based

• Protection of network cabling• Anti-virus software• Private addressing (10.*.*.*, etc.)

Page 108: Telecommunications and Network Security

CISSP Guide to Security Essentials 108

Network Countermeasures (cont.)

• Close unnecessary ports and services• Security patches• Unified Threat Management (UTM)• Gateways – filtering intermediaries

Page 109: Telecommunications and Network Security

CISSP Guide to Security Essentials 109

Summary• Wired telecom technologies include DS-1

(T-1), SONET, Frame Relay, ATM, DSL, and MPLS

• Wireless telecom technologies include CDMA2000 (which includes 1xRTT and EVDO), GPRS, EDGE, UMTS, and WiMAX

Page 110: Telecommunications and Network Security

CISSP Guide to Security Essentials 110

Summary (cont.)• Wired network technologies include

Ethernet, ATM, Token Ring, USB, RS-232

• Wireless network technologies include Wi-Fi and IrDA

Page 111: Telecommunications and Network Security

CISSP Guide to Security Essentials 111

Summary (cont.)• Ethernet is a frame technology that

uses an 8-octet address• The three network topologies are bus,

ring, and star

Page 112: Telecommunications and Network Security

CISSP Guide to Security Essentials 112

Summary (cont.)• Wi-Fi wireless networks can be secured

by turning off SSID broadcast, using a non-default SSID, utilizing WPA or WPA2 encryption, using user based authentication, and MAC based access control

Page 113: Telecommunications and Network Security

CISSP Guide to Security Essentials 113

Summary (cont.)• The seven layers of OSI are:

physical, data link, network, transport, session, presentation, and application

• The five-layer of TCP/IP are: physical, data link, network / internet, transport, and application

Page 114: Telecommunications and Network Security

CISSP Guide to Security Essentials 114

Summary (cont.)• Common tunneling (encapsulation)

protocols are SSL, SSH, IPsec, L2TP, PPTP, and PPP

• Common authentication protocols are RADIUS, Diameter, CHAP, EAP, and PEAP. TACACS and PAP are no longer widely used.

Page 115: Telecommunications and Network Security

CISSP Guide to Security Essentials 115

Summary (cont.)• TCP/IP data link layer protocols are

Ethernet, Token Ring, ATM, Frame Relay, and PPP

• TCP/IP network layer protocols are IPv4, IPv6, ARP, RARP, ICMP, IGMP, and IPsec

Page 116: Telecommunications and Network Security

CISSP Guide to Security Essentials 116

Summary (cont.)• TCP/IP transport layer protocols are

TCP and UDP• TCP/IP application layer protocols are

DHCP, DNS, FTP, HTTP, LDAP, NTP, RPC, SIP, SMTP, SNMP, TELNET, TFTP, and VoIP

Page 117: Telecommunications and Network Security

CISSP Guide to Security Essentials 117

Summary (cont.)• Common network based attacks are

Denial of Service (DoS), Distributed Denial of Service (DDoS), Teardrop, Sequence number, Smurf, Ping of Death, SYN flood, worms, spam, and phishing.

Page 118: Telecommunications and Network Security

CISSP Guide to Security Essentials 118

Summary (cont.)• Common network based vulnerabilities

are unneeded open ports, unpatched systems and devices, and misconfigured systems and devices.

• Effective countermeasures are access control lists (ACLs), firewalls, intrusion…

Page 119: Telecommunications and Network Security

CISSP Guide to Security Essentials 119

Summary (cont.)• …detection systems, intrusion prevention

systems, private addressing, closing unnecessary ports and services, installing security patches, and using gateways. UTM devices that perform many defensive functions are gaining use.