TELECOMMUNICATIONS AND NETWORK SECURITY
- The goal of security is to protect confidentiality, integrity, and availability.
- ARP poisoning sends fake ARP packets to change ARP cache tables and redirect traffic.
- DNS spoofing is much like ARP poisoning, except the attack attempts to poison the DNS cache. Victims can be redirected to wrong Internet sites.
- Sniffing is a passive attack that requires the attacker to gain some type of access to the network. Any clear-text information is at risk. FTP, Telnet, SMTP, and SNMP can be targets.
- POTS is a voice-grade analog telephone service used for voice calls and for connecting to the Internet and other locations via modem.
- ISDN is a communication protocol that operates similar to POTS, except all digital signaling is used. ISDN uses separate frequencies that are called "channels." It is configured as follows:
ISDN BRI Two 64Kbps B channels and one 16Kbps D channel
ISDN PRI Twenty-three 64Kbps B channels (US) and one 16Kbps D channel
- The seven layers of the Open Systems Interconnect models are: application, presentation, session, transport, network, data link, and physical.
- TCP/IP is the foundation of the Internet as we know it today. TCP/IP is similar to the OSI model but consists of only four layers. TCP/IP includes
TCP A reliable, slow, and connection-oriented protocol that ensures that packets are delivered to the destination computer
UDP A fast, best-effort, non-connection-oriented protocol
- Routing protocols can be divided into two broad categories.
Distance-vector protocols: RIP
Link-state protocols: OSPF
- TCP/IP data can be addressed as a unicast to one particular system; a multicast, which targets a group; or a broadcast, which goes to all systems.
- Data can be transmitted into two fundamental methods, including analog or digital, which converts the signals to a binary value.
- Information can move in two ways:
Asynchronous communication Two devices are not synchronized in any way.
Synchronous communication Two devices are synchronized and usually controlled by a clocking mechanism.
- Baseband transmission means the cable is used for the transmission of data.
- Broadband transmission means the cable is divided into channels so that different types of data can be transmitted at a time.
- Firewalls are used as a choke point and to control traffic into and out of a network.
- Common firewall terms include
Demilitarized zone (DMZ) A network segment that is located between the protected and the unprotected networks.
Bastion host A device that has been hardened and is to be deployed in the DMZ.
Packet filtering Considered a first level of defense. Access is based on rules.
Stateful packet filtering Method of control that keeps a state table to keep track of activity and control access.
Proxy Stands between the trusted and untrusted network.
- Honeypots are computers that are used to attempt to lure attackers away from the real network assets.
Категории