ISC(2) CISSP Revision Notes – Telecommunications and Network Security
Networks and security are a large part of the syllabus for the CISSP.
[alert style=”red”]In NO way should these notes be used as your sole source of study for the CISSP exam. These notes lack things completely that could be included on your exam. I in no way provide any guarantee or assurance that these notes are correct or satisfactory for your learning. For further information see my CISSP Study and Exam Tips.[/alert]
ISC(2) CISSP Revision Notes – Study and Exam Tips
ISC(2) CISSP Revision Notes – Overarching Themes for the CISSP
ISC(2) CISSP Revision Notes – Access Control
ISC(2) CISSP Revision Notes – Business Continuity and Disaster Planning
ISC(2) CISSP Revision Notes – Cryptography
ISC(2) CISSP Revision Notes – Information Security Governance and Risk Management
ISC(2) CISSP Revision Notes – Legal, Regulatory, Investigations and Compliance
ISC(2) CISSP Revision Notes – Operations Security
ISC(2) CISSP Revision Notes – Security Architectural Design
ISC(2) CISSP Revision Notes – Software Development Security
ISC(2) CISSP Revision Notes – Telecommunications and Network Security (You are here)
Networking
| OSI Model | TCP/IP (DOD) | Like What? | |
| 7 | Application | Application | SMTP, HTTP | 
| 6 | Presentation | Application | JPEG, MPEG | 
| 5 | Session | Application | RPC, NetBIOS | 
| 4 | Transmission | Transport | TCP | 
| 3 | Network | Internet | Routers, IP, ICMP | 
| 2 | Data-Link (LLC & MAC) | Network | Switches, Ethernet, ARP | 
| 1 | Physical | Network | Cables, hubs, topology | 
1) Physical
- Star, Mesh, Ring, Bus
 - Cable Types:
- Coaxial – Durable and resistant to EMI, quite slow and expensive
 - Twinaxial – 2 X coaxial, faster and short distance
 - Twisted Pair – eg Cat3, Cat5, Cat5e, Cat6, etc. UTP vs STP. Cheap
 - Fiber-optic – No EFI or RFI, fast and very expensive
 
 
2) Data-Link Layer
- Ensures delivery to proper device
 - LLC – Managed Frames
 - MAC – Error Control (CRC), contention, token passing, polling
 - L2TP, PPTP, SLIP
 - Circuit Switched Networks
- “Think old leased lines”, always on, examples include DSL, DOCSIS, ISDN
 - Packet Switched Networks
- ATM, Frame Relay, MPLS, X.25
 
 
 
3) Network Layer
- Routers & routing protocols
 - RIP
- Split horizon (don’t push routes back down the same way)
 - Route poising (unreachable routes)
 - Hold down (how long until link is dead)
 - OSPF uses Autonomous System (AS)
 - BCP in use by ISPs
 - IP, IPX, ICMP
 - Class A 1 – 126 0.0.0.0
 - Class B 128 – 191 255.0.0.0
 - Class C 192 – 223 255.255.0.0
 - Class D 224 – 239 255.255.255.0
 - Class E 240 – 254
 
 
4) Transport Layer
- Flow Control, Multiplexing, Virtual Circuits & Error Checking
 - “Reliable end to end control”
 - TCP – Full duplex & connection orientated
 - UDP – Connectionless, best efforts but fast
 - SSL & TLS
 
5) Session Layer
- Establishes, co-ordinates and terminates communication sessions
 - SSH, NetBIOS, NFS, RPS, SIP
 
6) Presentation Layer
- Coding and conversion function
 - ASCII, JPG, GIF, MPEG, etc
 
7) Application Layer
- Identify and establish
 - FTP, HTTP, IMAP, POP3, etc
 
Firewall Types
- Packet Filtering / Screening Router
- Basic and inexpensive
 - Uses on TCP, UDP, ICMP and IP headers (source, destination, service) with ACLs
 - Circuit Level Gateway / Stateful Inspection Firewall
- Maintains state information of stream
 - Tunnel/virtual circuit created
 - Layer 5
 - Fast
 - Application Level Gateway
- Think proxy server
 - Slows down the channel
 
 
 
 
Firewall Architectures
Screening Router
- Placed Between trusted and untrusted networks
 - ACL based but otherwise basic
 
Dual Homed Gateways / Bastion Host
- Think proxies, gateways, etc
 - Usually a hardened system
 
Screened Host Gateways
- Uses screening router to an internal bastion host (think DMZ on home routers)
 - Screened Subnet
 - Think DMZ, uses screening router – bastion host – screening router
 
IPS, IDP & IDPS
- Active: IPS (Automatically stops bad traffic)
 - Passive: IDS (Monitors and analyses)
 - Knowledge Based: Signature, low false alarm rates, signatures need to be up to date
 - Behavior Based: Baselines, high false alarm rates, traffic may change over time
 
Remote Access
RAS (PAP, CHAP, EAP), RADIUS, Diameter, TACAS
VPNs
- Client to Firewall, Firewall to Firewall, Router to Router
 - PPTP: Layer 2 (Microsoft)
 - L2F: Layer 2 (Cisco)
 - L2TP: Combination of PPTP and L2F
 - IPSec VPN
- Modes
- Transport: only data is encrypted
 - Tunnel: Entire packet is encrypted
 
 
 - Modes
 - Protocols & Terms
- Security Association (SA): Details individual tunnel (each AH and ESP requires one 2:n SAs)
 - Authentication Header (AH): Integrity, Authentication and Non-repudiation
 - Encapsulation Security Payload (ESP): Confidentiality
 - SPI: 32 bit string identifying SA
 - Destination IP
 - Security Protocol ID: Either AH or ESP
 - IKE (Internet Key Exchange)
 
 
WLAN
- Modes: Root, Repeater, Bridge, (ad-hoc)
 - WEP
- RC4 Ciher, 40 or 104 bit key (+IV (24bit) = 64 or 128bit), CRC-32, NOT SECURE
 - WPA
- 802.11x TKIP, key plus counter
 - WPA2
- AES, counter mode and Cipher Block Chaining (CBC)
 
 
 
 
Email Security
RBLs, scanning, reputation, third party, in-house, etc
Web Security
Script injections, buffer overflow, DoS
Attacks
Bluejacking and Bluesnarfing: Bluetooth
Fraggle: UDP Echo
ICMP Flood: Large number of pings
Session Hijacking: Poor generation of session numbers
Smurf: ICMP echo request broadcast to susceptible network segment which then saturate the target
Syn Flood: Half opened TCP connections flood the target and left half open, consumes resources
Teardrop: Fragments of length of packets confuse the target
UDP Flood: UDP consumes bandwidth
[alert style=”red”]In NO way should these notes be used as your sole source of study for the CISSP exam. These notes lack things completely that could be included on your exam. I in no way provide any guarantee or assurance that these notes are correct or satisfactory for your learning. For further information see my CISSP Study and Exam Tips.[/alert]
                    


3 Comments
[…] ISC(2) CISSP Revision Notes – Study and Exam Tips ISC(2) CISSP Revision Notes – Overarching Themes for the CISSP ISC(2) CISSP Revision Notes – Access Control ISC(2) CISSP Revision Notes – Business Continuity and Disaster Planning ISC(2) CISSP Revision Notes – Cryptography ISC(2) CISSP Revision Notes – Information Security Governance and Risk Management ISC(2) CISSP Revision Notes – Legal, Regulatory, Investigations and Compliance ISC(2) CISSP Revision Notes – Operations Security ISC(2) CISSP Revision Notes – Security Architectural Design ISC(2) CISSP Revision Notes – Software Development Security (You are here) ISC(2) CISSP Revision Notes – Telecommunications and Network Security […]
[…] ISC(2) CISSP Revision Notes – Study and Exam Tips ISC(2) CISSP Revision Notes – Overarching Themes for the CISSP ISC(2) CISSP Revision Notes – Access Control (You are here) ISC(2) CISSP Revision Notes – Business Continuity and Disaster Planning ISC(2) CISSP Revision Notes – Cryptography ISC(2) CISSP Revision Notes – Information Security Governance and Risk Management ISC(2) CISSP Revision Notes – Legal, Regulatory, Investigations and Compliance ISC(2) CISSP Revision Notes – Operations Security ISC(2) CISSP Revision Notes – Security Architectural Design ISC(2) CISSP Revision Notes – Software Development Security ISC(2) CISSP Revision Notes – Telecommunications and Network Security […]
[…] ISC(2) CISSP Revision Notes – Study and Exam Tips (You are here) ISC(2) CISSP Revision Notes – Overarching Themes for the CISSP ISC(2) CISSP Revision Notes – Access Control ISC(2) CISSP Revision Notes – Business Continuity and Disaster Planning ISC(2) CISSP Revision Notes – Cryptography ISC(2) CISSP Revision Notes – Information Security Governance and Risk Management ISC(2) CISSP Revision Notes – Legal, Regulatory, Investigations and Compliance ISC(2) CISSP Revision Notes – Operations Security ISC(2) CISSP Revision Notes – Security Architectural Design ISC(2) CISSP Revision Notes – Software Development Security ISC(2) CISSP Revision Notes – Telecommunications and Network Security […]