Untitled document - Google Docs.pdf

Full Transcript

‭7 layers of the OSI MODEL‬ ‭OSI model-‬ ‭.‬ O a ‭ PEN SYSTEMS INTERCONNECT MODEL‬ ‭b.‬ ‭Framework that describes networking or telecommunications systems as‬‭7 layers.‬ ‭c.‬ ‭Those 7 layers are Application, Presentation, session, transport, network, data link, and‬ ‭ph...

‭7 layers of the OSI MODEL‬ ‭OSI model-‬ ‭.‬ O a ‭ PEN SYSTEMS INTERCONNECT MODEL‬ ‭b.‬ ‭Framework that describes networking or telecommunications systems as‬‭7 layers.‬ ‭c.‬ ‭Those 7 layers are Application, Presentation, session, transport, network, data link, and‬ ‭physical‬ ‭Layer 7: Application‬ ‭.‬ E a ‭ ND USER LAYER‬ ‭b.‬ ‭Display data to user‬ ‭Layer 6: Presentation‬ ‭ENCRYPTION‬ ‭a.‬ T ‭ ransforms data between format required from the network to format required for‬ ‭application‬ ‭b.‬ ‭Translation of network format to application format‬ ‭c.‬ ‭encryption/decryption for secured transmission‬ ‭d.‬ ‭Compressing data‬ ‭Layer 5: Session‬ ‭.‬ ‭When hosts need to communicate‬ a ‭b.‬ ‭Setup, coordination, and termination between devices‬ ‭c.‬ ‭Layer 4: Transport‬ ‭PORTS, TCP/UDP‬ ‭SEGMENTS‬ ‭.‬ a ‭ nd to end communication of data transfer between end system and host‬ E ‭b.‬ ‭Determine how much to send and at what rate‬ ‭c.‬ ‭Assigning port numbers‬ ‭d.‬ ‭TCP: TRANSITION CONTROL PROTOCOL‬ ‭e.‬ ‭UDP: USER DATAGRAM PROTOCOL‬ ‭Layer 3: Network‬ ‭TCP/IP‬ ‭PACKETS‬ ‭.‬ P a ‭ acket forwarding‬ ‭b.‬ ‭Routing between router to router‬ ‭c.‬ ‭Breaks up segments into packets‬ ‭.‬ ‭Best physical path for data to reach its destination‬ d ‭e.‬ ‭IP ADRESSES‬ ‭Layer 2: Data link‬ ‭MAC‬ ‭FRAMES‬ ‭.‬ ‭Facilitates data transfer between two devices on the same network‬ a ‭b.‬ ‭Node to node data transfer between to directly connected node to node‬ ‭c.‬ ‭Handles error correction from physical layer‬ ‭d.‬ ‭Has two sub layers‬ ‭e.‬ ‭MAC- Media access control‬ ‭f.‬ ‭LLC- logical link control‬ ‭Layer 1: Physical‬ ‭CABLES‬ ‭BITS‬ ‭.‬ a ‭ hysical structure‬ P ‭b.‬ ‭Things like coax, fiber optic cable, wireless, etc.‬ ‭c.‬ ‭Transition of‬‭BITS‬‭of signals from node to node‬ ‭d.‬ ‭Unbounded media‬ ‭USING OSI MODEL: SENDER TRAFFIC GO DOWN OSI MODEL‬ ‭RECEIVER TRAFFIC WILL GO UP OSI MODEL‬ ‭PORTS‬ ‭.‬ a ‭ etworking construct‬ N ‭b.‬ ‭Multiple network requests/ multiple serves available‬ ‭c.‬ ‭Network connection: open port>your port‬ ‭d.‬ ‭65535 ports‬ ‭e.‬ ‭THREE CATEGORIES‬ ‭i.‬ ‭WELL KNOWN‬ ‭ii.‬ ‭REGISTERED PORTS‬ ‭iii.‬ ‭DYNAMIC USE BY APPLICATION‬ ‭f.‬ ‭PORT 22: SSH- SECURE SHELL‬ ‭i.‬ ‭Remotely connect to virtual machines‬ ‭g.‬ ‭PORT 53: DNS- DOMAIN NAME SYSTEM‬ ‭i.‬ ‭Translates websites into machine readable IP addresses.‬ ‭ii.‬ ‭Its like a phone book using IP ADDRESSES‬ ‭h.‬ ‭PORT 25: SMTP: SIMPLE MAIL TRANSFER PROTOCOL‬ ‭i.‬ ‭Used to send and receive emails‬ ‭ii.‬ ‭Its like your computers mailbox‬ ‭i.‬ ‭PORT 20 OR 21: FTP- FILE TRANSFER PROTOCOL‬ ‭i.‬ ‭Method of transferring files between computers over a network‬ ‭ii.‬ ‭PORT 20: DATA CHANNEL‬ ‭1.‬ ‭Port used to transfer the files themselves‬ ‭iii.‬ ‭PORT 21: THE COMMAND CHANNEL‬ ‭1.‬ ‭Used for sending commands related to file transfers‬ ‭j.‬ ‭PORT 80 HTTP: HYPER TEXT TRANSFER PROTOCOL‬ ‭i.‬ ‭Allows your web browser to communicate with web serves and display web page‬ ‭ii.‬ ‭The door you use to access the vast world of websites‬ ‭k.‬ ‭PORT 443: HYPER TEXT TRANSFER PROTOCOL SECURED‬ ‭PROTOCOLS‬ ‭.‬ E a ‭ stablished set of rules that will determine how data is transmitted in the same network‬ ‭b.‬ ‭Connected devices communicate with each other‬ ‭c.‬ ‭ICMP‬ ‭i.‬ ‭PING‬ ‭ii.‬ ‭INTERNET CONNECTION MESSAGE PROTOCOL‬ ‭1.‬ ‭SUCCESS OR FAILURE COMMUNICATING WITH OTHER IPS‬ ‭d.‬ ‭UDP‬ ‭i.‬ ‭USER DATAGRAM PROTOCOL‬ ‭1.‬ ‭ESTABLISH LOW LACENTCY AND LOSS TOLERATING BETWEEN‬ ‭APPLICATIONS ON THE INTERNET‬ ‭2.‬ ‭CONNECTIONLESS CONNECTIONS‬ ‭3.‬ ‭FASTER‬ ‭e.‬ ‭TCP‬ ‭i.‬ ‭TRANSMISSION CONTROL PROTOCOL‬ ‭1.‬ ‭HOW TO ESTABLISH AND MAINTAIN BY WHICH APPLICATIONS CAN‬ ‭EXCHANGE DATA‬ ‭2.‬ ‭Threeway handshake‬ ‭a.‬ ‭Client-syn packet‬ ‭b.‬ ‭server-syn/ack‬ ‭c.‬ ‭Client ack‬ ‭3.‬ ‭CONNECTION ORIENTEND‬ ‭4.‬ ‭SLOWER‬ ‭f.‬ ‭IP‬ ‭i.‬ ‭INTERNET PROTOCOL‬ ‭IPv4 VS IPv6‬ ‭CYBERSECURITY‬ ‭CIA TRIAD‬ ‭A.‬ ‭CONFIDENTIALITY‬ ‭a.‬ ‭Only people that need to know basis‬ ‭B.‬ ‭INTEGRITY‬ ‭a.‬ ‭Data stored and transferred as intended and modification is authorized‬ ‭C.‬ ‭AVAILABILITY‬ ‭a.‬ ‭Information is accessible to people who are authorized‬ ‭D.‬ ‭NON-REPUDIATION‬ ‭a.‬ ‭Subject cannot deny doing something‬ ‭ YBERSECURITY FRAMEWORK‬ C ‭ IST CLASSIFIED THE PROVISIONING SECURE HARDWARE AND SOFTWARE INTO FIVE‬ N ‭FUNCTIONS‬ ‭a.‬ ‭Identify‬ ‭i.‬ ‭Develop security policies and capablilties‬ ‭b.‬ ‭Protect‬ ‭i.‬ ‭Intstall, operate, and decommission it hardware and software‬ ‭c.‬ ‭Deteck‬ ‭i.‬ ‭Perform ongoing proactive monitoring‬ ‭d.‬ ‭Respond‬ ‭i.‬ ‭Intensify contain and eradicate threats‬ ‭e.‬ ‭Recover‬ ‭i.‬ ‭Restore systems and data‬ ‭Security control categories‬ ‭a.‬ ‭Three main categories‬ ‭i.‬ ‭Technical‬ ‭1.‬ ‭Control is implemented as a system‬ ‭a.‬ ‭Firewalls‬ ‭ii.‬ ‭Operational‬ ‭1.‬ ‭Implemented by people‬ ‭a.‬ ‭Training programs‬ ‭iii.‬ ‭Managerial‬ ‭1.‬ ‭Oversight of the informational systems‬ ‭VULERNABILITY, THREAT, AND RISK‬ ‭a.‬ ‭Vulnerability‬ ‭i.‬ ‭Weakness that can be triggered‬ ‭b.‬ ‭Threat‬ ‭i.‬ ‭Potential for vulnerability to be exploited‬ ‭c.‬ ‭risk‬ ‭i.‬ ‭Likelihood and impact of threat actor exploiting vulnerability‬ ‭Malware‬ ‭A.virus and worms‬ ‭Spread without user authorization‬ ‭B. trojan‬ ‭Malware concealed within legitimate software‬ ‭C. potentially unwanted programs (PUPS)‬ ‭Software installed alongside a install package‬ ‭RANSOMWARE‬ ‭Display threatening messages to extort money.‬ ‭Social engineering‬ ‭a.‬ ‭Phishing‬ ‭i.‬ ‭Tricks the end user into interacting with a malicious resource‬ ‭b.‬ ‭Spear phishing‬ ‭i.‬ ‭Scam specifically toward an end user‬ ‭c.‬ ‭Whaling‬ ‭i.‬ ‭Phishing attack toward executive management‬ ‭Cryptographu‬ ‭a.‬ ‭Plaintext‬ ‭i.‬ ‭Encrypted message‬ ‭b.‬ ‭Ciphertext‬ ‭i.‬ ‭Encrypted message‬ ‭c.‬ ‭Cipher‬ ‭i.‬ ‭Process used to encrypt or decrypt‬ ‭d.‬ ‭Hashing‬ ‭i.‬ ‭Fixed length string for an input plaintext‬ ‭Distributed denial of service attacks DDoS‬ ‭a.‬ ‭Attacker seeks to make a machine network resource unavailable‬ ‭LINUX‬ -‭ ‬ ‭ reated in 1991‬ C ‭-‬ ‭Seen in smart cars and home appliances‬ ‭-‬ ‭LINUS TORWALD CREATED IT‬ ‭-‬ ‭FEARED BECAUSE ITS EXTREMELY CUSTOMIZABLE‬ -‭ ‬ ‭ LI: COMMAND LINE INTERFACE‬ C ‭-‬ ‭LINUX IS OPEN SOURCE‬ ‭-‬ ‭RED HAT, FEDORA, ETC‬ ‭ OMMAND USER‬ C ‭$USER‬ ‭#ROOT‬ ‭BASIC COMMANDS‬ ‭-‬ ‭whoami‬ ‭-‬ ‭Prints current user‬ ‭-‬ ‭pwd‬ ‭-‬ ‭Print working directory. Where you are‬ ‭-‬ ‭cd‬ ‭-‬ ‭Change Directory‬ ‭-‬ ‭ls‬ ‭-‬ ‭Lists the content of a directory and potentialy give options to view permissions‬ ‭and hidden files‬ ‭-‬ ‭cat‬ ‭-‬ ‭Used to show the content of a file without editing‬ ‭-‬ ‭touch‬ ‭-‬ ‭Create a blank canvas file‬ ‭-‬ ‭echo‬ ‭-‬ ‭Outputs any text we provide, either displayed or to a file‬

Use Quizgecko on...
Browser
Browser