CISSP Telecommunications and Network Security

Open Systems Interconnect (OSI) Model

Encapsulation: A process whereby all layers in the stack store data in a   format required by the next layer.

–The seven Layers of the OSI Model Application Layer

OSI MODEL TCP/IP Model
7 Application Application
6 Presentation
5 Session
4 Transport Transport
3 Network Internet
2 Data Link NetworkAccess
1 Physical

 

 

OSI model

 

TCP (Transmission Control Protocol)

–Often combined with IP and referred to as a suite of protocols; i.e. it includes a assortment of protocols.

 

IP (Internet Protocol, a.k.a. IPv4)

–Often bundled with TCP as a suite of protocols.

 

 

IPv6 (Internet Protocol version 6; RFC 2460)

 

Types of Transmission

Analog – An analog signal can vary continuously between a maximum and minimum value and it can assume an infinite number of values between the two extremes.

Digital – Signals represent binary digits as electrical pulses.

 

 

 

Asynchronous communications

–No clocking mechanism required

 

Synchronous communication

–Clocking mechanism required

 

Broadband

–Divides channel into many individual independent channels allowing more data to be transmitted in a given amount of time (analogy: much as more lanes on a highway allow more cars to travel along it at the same time)

 

Baseband

–A telecommunication system in which data is carried in digital form on a single unmultiplexed signal channel on the transmission medium as used in Ethernet.

–Uses the entire channel for transmission

 

Unicast

–When a packet is sent from one source to device to a one destination device.

 

Multicast

–When a packet is sent from one source device to several specific devices.

 

Broadcast

–When a packet is sent from one source to device to all devices within a network segment.

 

Circuit vs. Packet Switching

Circuit switching

 

Packet switching

 

 

Routing Protocols

Network Devices

 

Firewalls

Block hostile traffic and allow authorized traffic to protect a network from an untrusted network.

Packet Filtering

–Packet filtering firewalls operate at the network layer of the OSI Model

–Packet filtering takes place using an Access Control List (ACL)

–The ACL provides information as to what packets can be accepted and what packets to be denied access

–This type of firewall compares the packet header with a set of rules in the ACL

 

Proxy Firewalls

–Inspects packets’ payload

–Offers better security than the first generation firewall

–Considered a second generation firewall

 

There are 3 types of Proxy Firewalls

–Application-level proxy

–Circuit-level proxy

 

–Kernel proxy

 

 

Stateful Inspection

–Usually Operates at the network layer of the OSI Model

–It investigates packet header, payload, and trailer

–Maintains a state table. This table contains information related to packets in previous connections and includes the source and destination IPs, source and destination ports, and acknowledgement bits

–The advantage of this firewall is added security because it keeps track of all packets until their connection are closed

–Also tracks connectionless protocols such as UDP and ICMP

–Known as a third generation firewall

 

 

DMZ – A section of network that is made available for public   access.

 

 

 

VPN – Virtual Private Network

Provides:

 

 

To accomplish the above goals (privacy, authentication, data integrity, and anti-replay), two devices near the edge of the Internet create a VPN, sometimes called a VPN tunnel. These devices add headers to the original packet, including fields that allow the VPN devices to perform all the functions. The VPN devices also encrypt the original IP packet.

Site-to-Site : When a VPN connects two site of a company, in particular. Also sometimes called Gateway-to-Gateway.

Host-to-Site: When a VPN connects a user/device from a remote location (home/hotel) to a company. Also sometimes called Host-to-Gateway.

 

VPN – Implementation

SSL VPN – a browser is needed for connectivity. Usually implemented for users to access only web-based applications. It is easier to deploy on workstations than IPSec VPN.

 

IPSec VPN – a client software needs to be installed on client machines. Usually implemented for access to entire network.

Deemed to be more secured. But costs more due to client software licensing.

 

To Become Certified For CISSP Please Visit This Link;

Exit mobile version