Untitled document - Google Docs.pdf
Document Details

Uploaded by StunningOtter5909
Tags
Full Transcript
â€7 layers of the OSI MODEL‬ â€OSI model-‬ â€.‬ O a †PEN SYSTEMS INTERCONNECT MODEL‬ â€b.‬ â€Framework that describes networking or telecommunications systems as‬â€7 layers.‬ â€c.‬ â€Those 7 layers are Application, Presentation, session, transport, network, data link, and‬ â€ph...
â€7 layers of the OSI MODEL‬ â€OSI model-‬ â€.‬ O a †PEN SYSTEMS INTERCONNECT MODEL‬ â€b.‬ â€Framework that describes networking or telecommunications systems as‬â€7 layers.‬ â€c.‬ â€Those 7 layers are Application, Presentation, session, transport, network, data link, and‬ â€physical‬ â€Layer 7: Application‬ â€.‬ E a †ND USER LAYER‬ â€b.‬ â€Display data to user‬ â€Layer 6: Presentation‬ â€ENCRYPTION‬ â€a.‬ T †ransforms data between format required from the network to format required for‬ â€application‬ â€b.‬ â€Translation of network format to application format‬ â€c.‬ â€encryption/decryption for secured transmission‬ â€d.‬ â€Compressing data‬ â€Layer 5: Session‬ â€.‬ â€When hosts need to communicate‬ a â€b.‬ â€Setup, coordination, and termination between devices‬ â€c.‬ â€Layer 4: Transport‬ â€PORTS, TCP/UDP‬ â€SEGMENTS‬ â€.‬ a †nd to end communication of data transfer between end system and host‬ E â€b.‬ â€Determine how much to send and at what rate‬ â€c.‬ â€Assigning port numbers‬ â€d.‬ â€TCP: TRANSITION CONTROL PROTOCOL‬ â€e.‬ â€UDP: USER DATAGRAM PROTOCOL‬ â€Layer 3: Network‬ â€TCP/IP‬ â€PACKETS‬ â€.‬ P a †acket forwarding‬ â€b.‬ â€Routing between router to router‬ â€c.‬ â€Breaks up segments into packets‬ â€.‬ â€Best physical path for data to reach its destination‬ d â€e.‬ â€IP ADRESSES‬ â€Layer 2: Data link‬ â€MAC‬ â€FRAMES‬ â€.‬ â€Facilitates data transfer between two devices on the same network‬ a â€b.‬ â€Node to node data transfer between to directly connected node to node‬ â€c.‬ â€Handles error correction from physical layer‬ â€d.‬ â€Has two sub layers‬ â€e.‬ â€MAC- Media access control‬ â€f.‬ â€LLC- logical link control‬ â€Layer 1: Physical‬ â€CABLES‬ â€BITS‬ â€.‬ a †hysical structure‬ P â€b.‬ â€Things like coax, fiber optic cable, wireless, etc.‬ â€c.‬ â€Transition of‬â€BITS‬â€of signals from node to node‬ â€d.‬ â€Unbounded media‬ â€USING OSI MODEL: SENDER TRAFFIC GO DOWN OSI MODEL‬ â€RECEIVER TRAFFIC WILL GO UP OSI MODEL‬ â€PORTS‬ â€.‬ a †etworking construct‬ N â€b.‬ â€Multiple network requests/ multiple serves available‬ â€c.‬ â€Network connection: open port>your port‬ â€d.‬ â€65535 ports‬ â€e.‬ â€THREE CATEGORIES‬ â€i.‬ â€WELL KNOWN‬ â€ii.‬ â€REGISTERED PORTS‬ â€iii.‬ â€DYNAMIC USE BY APPLICATION‬ â€f.‬ â€PORT 22: SSH- SECURE SHELL‬ â€i.‬ â€Remotely connect to virtual machines‬ â€g.‬ â€PORT 53: DNS- DOMAIN NAME SYSTEM‬ â€i.‬ â€Translates websites into machine readable IP addresses.‬ â€ii.‬ â€Its like a phone book using IP ADDRESSES‬ â€h.‬ â€PORT 25: SMTP: SIMPLE MAIL TRANSFER PROTOCOL‬ â€i.‬ â€Used to send and receive emails‬ â€ii.‬ â€Its like your computers mailbox‬ â€i.‬ â€PORT 20 OR 21: FTP- FILE TRANSFER PROTOCOL‬ â€i.‬ â€Method of transferring files between computers over a network‬ â€ii.‬ â€PORT 20: DATA CHANNEL‬ â€1.‬ â€Port used to transfer the files themselves‬ â€iii.‬ â€PORT 21: THE COMMAND CHANNEL‬ â€1.‬ â€Used for sending commands related to file transfers‬ â€j.‬ â€PORT 80 HTTP: HYPER TEXT TRANSFER PROTOCOL‬ â€i.‬ â€Allows your web browser to communicate with web serves and display web page‬ â€ii.‬ â€The door you use to access the vast world of websites‬ â€k.‬ â€PORT 443: HYPER TEXT TRANSFER PROTOCOL SECURED‬ â€PROTOCOLS‬ â€.‬ E a †stablished set of rules that will determine how data is transmitted in the same network‬ â€b.‬ â€Connected devices communicate with each other‬ â€c.‬ â€ICMP‬ â€i.‬ â€PING‬ â€ii.‬ â€INTERNET CONNECTION MESSAGE PROTOCOL‬ â€1.‬ â€SUCCESS OR FAILURE COMMUNICATING WITH OTHER IPS‬ â€d.‬ â€UDP‬ â€i.‬ â€USER DATAGRAM PROTOCOL‬ â€1.‬ â€ESTABLISH LOW LACENTCY AND LOSS TOLERATING BETWEEN‬ â€APPLICATIONS ON THE INTERNET‬ â€2.‬ â€CONNECTIONLESS CONNECTIONS‬ â€3.‬ â€FASTER‬ â€e.‬ â€TCP‬ â€i.‬ â€TRANSMISSION CONTROL PROTOCOL‬ â€1.‬ â€HOW TO ESTABLISH AND MAINTAIN BY WHICH APPLICATIONS CAN‬ â€EXCHANGE DATA‬ â€2.‬ â€Threeway handshake‬ â€a.‬ â€Client-syn packet‬ â€b.‬ â€server-syn/ack‬ â€c.‬ â€Client ack‬ â€3.‬ â€CONNECTION ORIENTEND‬ â€4.‬ â€SLOWER‬ â€f.‬ â€IP‬ â€i.‬ â€INTERNET PROTOCOL‬ â€IPv4 VS IPv6‬ â€CYBERSECURITY‬ â€CIA TRIAD‬ â€A.‬ â€CONFIDENTIALITY‬ â€a.‬ â€Only people that need to know basis‬ â€B.‬ â€INTEGRITY‬ â€a.‬ â€Data stored and transferred as intended and modification is authorized‬ â€C.‬ â€AVAILABILITY‬ â€a.‬ â€Information is accessible to people who are authorized‬ â€D.‬ â€NON-REPUDIATION‬ â€a.‬ â€Subject cannot deny doing something‬ †YBERSECURITY FRAMEWORK‬ C †IST CLASSIFIED THE PROVISIONING SECURE HARDWARE AND SOFTWARE INTO FIVE‬ N â€FUNCTIONS‬ â€a.‬ â€Identify‬ â€i.‬ â€Develop security policies and capablilties‬ â€b.‬ â€Protect‬ â€i.‬ â€Intstall, operate, and decommission it hardware and software‬ â€c.‬ â€Deteck‬ â€i.‬ â€Perform ongoing proactive monitoring‬ â€d.‬ â€Respond‬ â€i.‬ â€Intensify contain and eradicate threats‬ â€e.‬ â€Recover‬ â€i.‬ â€Restore systems and data‬ â€Security control categories‬ â€a.‬ â€Three main categories‬ â€i.‬ â€Technical‬ â€1.‬ â€Control is implemented as a system‬ â€a.‬ â€Firewalls‬ â€ii.‬ â€Operational‬ â€1.‬ â€Implemented by people‬ â€a.‬ â€Training programs‬ â€iii.‬ â€Managerial‬ â€1.‬ â€Oversight of the informational systems‬ â€VULERNABILITY, THREAT, AND RISK‬ â€a.‬ â€Vulnerability‬ â€i.‬ â€Weakness that can be triggered‬ â€b.‬ â€Threat‬ â€i.‬ â€Potential for vulnerability to be exploited‬ â€c.‬ â€risk‬ â€i.‬ â€Likelihood and impact of threat actor exploiting vulnerability‬ â€Malware‬ â€A.virus and worms‬ â€Spread without user authorization‬ â€B. trojan‬ â€Malware concealed within legitimate software‬ â€C. potentially unwanted programs (PUPS)‬ â€Software installed alongside a install package‬ â€RANSOMWARE‬ â€Display threatening messages to extort money.‬ â€Social engineering‬ â€a.‬ â€Phishing‬ â€i.‬ â€Tricks the end user into interacting with a malicious resource‬ â€b.‬ â€Spear phishing‬ â€i.‬ â€Scam specifically toward an end user‬ â€c.‬ â€Whaling‬ â€i.‬ â€Phishing attack toward executive management‬ â€Cryptographu‬ â€a.‬ â€Plaintext‬ â€i.‬ â€Encrypted message‬ â€b.‬ â€Ciphertext‬ â€i.‬ â€Encrypted message‬ â€c.‬ â€Cipher‬ â€i.‬ â€Process used to encrypt or decrypt‬ â€d.‬ â€Hashing‬ â€i.‬ â€Fixed length string for an input plaintext‬ â€Distributed denial of service attacks DDoS‬ â€a.‬ â€Attacker seeks to make a machine network resource unavailable‬ â€LINUX‬ -†‬ †reated in 1991‬ C â€-‬ â€Seen in smart cars and home appliances‬ â€-‬ â€LINUS TORWALD CREATED IT‬ â€-‬ â€FEARED BECAUSE ITS EXTREMELY CUSTOMIZABLE‬ -†‬ †LI: COMMAND LINE INTERFACE‬ C â€-‬ â€LINUX IS OPEN SOURCE‬ â€-‬ â€RED HAT, FEDORA, ETC‬ †OMMAND USER‬ C â€$USER‬ â€#ROOT‬ â€BASIC COMMANDS‬ â€-‬ â€whoami‬ â€-‬ â€Prints current user‬ â€-‬ â€pwd‬ â€-‬ â€Print working directory. Where you are‬ â€-‬ â€cd‬ â€-‬ â€Change Directory‬ â€-‬ â€ls‬ â€-‬ â€Lists the content of a directory and potentialy give options to view permissions‬ â€and hidden files‬ â€-‬ â€cat‬ â€-‬ â€Used to show the content of a file without editing‬ â€-‬ â€touch‬ â€-‬ â€Create a blank canvas file‬ â€-‬ â€echo‬ â€-‬ â€Outputs any text we provide, either displayed or to a file‬