Untitled document - Google Docs.pdf
Document Details
Uploaded by StunningOtter5909
Tags
Full Transcript
7 layers of the OSI MODEL OSI model- . O a PEN SYSTEMS INTERCONNECT MODEL b. Framework that describes networking or telecommunications systems as7 layers. c. Those 7 layers are Application, Presentation, session, transport, network, data link, and ph...
7 layers of the OSI MODEL OSI model- . O a PEN SYSTEMS INTERCONNECT MODEL b. Framework that describes networking or telecommunications systems as7 layers. c. Those 7 layers are Application, Presentation, session, transport, network, data link, and physical Layer 7: Application . E a ND USER LAYER b. Display data to user Layer 6: Presentation ENCRYPTION a. T ransforms data between format required from the network to format required for application b. Translation of network format to application format c. encryption/decryption for secured transmission d. Compressing data Layer 5: Session . When hosts need to communicate a b. Setup, coordination, and termination between devices c. Layer 4: Transport PORTS, TCP/UDP SEGMENTS . a nd to end communication of data transfer between end system and host E b. Determine how much to send and at what rate c. Assigning port numbers d. TCP: TRANSITION CONTROL PROTOCOL e. UDP: USER DATAGRAM PROTOCOL Layer 3: Network TCP/IP PACKETS . P a acket forwarding b. Routing between router to router c. Breaks up segments into packets . Best physical path for data to reach its destination d e. IP ADRESSES Layer 2: Data link MAC FRAMES . Facilitates data transfer between two devices on the same network a b. Node to node data transfer between to directly connected node to node c. Handles error correction from physical layer d. Has two sub layers e. MAC- Media access control f. LLC- logical link control Layer 1: Physical CABLES BITS . a hysical structure P b. Things like coax, fiber optic cable, wireless, etc. c. Transition ofBITSof signals from node to node d. Unbounded media USING OSI MODEL: SENDER TRAFFIC GO DOWN OSI MODEL RECEIVER TRAFFIC WILL GO UP OSI MODEL PORTS . a etworking construct N b. Multiple network requests/ multiple serves available c. Network connection: open port>your port d. 65535 ports e. THREE CATEGORIES i. WELL KNOWN ii. REGISTERED PORTS iii. DYNAMIC USE BY APPLICATION f. PORT 22: SSH- SECURE SHELL i. Remotely connect to virtual machines g. PORT 53: DNS- DOMAIN NAME SYSTEM i. Translates websites into machine readable IP addresses. ii. Its like a phone book using IP ADDRESSES h. PORT 25: SMTP: SIMPLE MAIL TRANSFER PROTOCOL i. Used to send and receive emails ii. Its like your computers mailbox i. PORT 20 OR 21: FTP- FILE TRANSFER PROTOCOL i. Method of transferring files between computers over a network ii. PORT 20: DATA CHANNEL 1. Port used to transfer the files themselves iii. PORT 21: THE COMMAND CHANNEL 1. Used for sending commands related to file transfers j. PORT 80 HTTP: HYPER TEXT TRANSFER PROTOCOL i. Allows your web browser to communicate with web serves and display web page ii. The door you use to access the vast world of websites k. PORT 443: HYPER TEXT TRANSFER PROTOCOL SECURED PROTOCOLS . E a stablished set of rules that will determine how data is transmitted in the same network b. Connected devices communicate with each other c. ICMP i. PING ii. INTERNET CONNECTION MESSAGE PROTOCOL 1. SUCCESS OR FAILURE COMMUNICATING WITH OTHER IPS d. UDP i. USER DATAGRAM PROTOCOL 1. ESTABLISH LOW LACENTCY AND LOSS TOLERATING BETWEEN APPLICATIONS ON THE INTERNET 2. CONNECTIONLESS CONNECTIONS 3. FASTER e. TCP i. TRANSMISSION CONTROL PROTOCOL 1. HOW TO ESTABLISH AND MAINTAIN BY WHICH APPLICATIONS CAN EXCHANGE DATA 2. Threeway handshake a. Client-syn packet b. server-syn/ack c. Client ack 3. CONNECTION ORIENTEND 4. SLOWER f. IP i. INTERNET PROTOCOL IPv4 VS IPv6 CYBERSECURITY CIA TRIAD A. CONFIDENTIALITY a. Only people that need to know basis B. INTEGRITY a. Data stored and transferred as intended and modification is authorized C. AVAILABILITY a. Information is accessible to people who are authorized D. NON-REPUDIATION a. Subject cannot deny doing something YBERSECURITY FRAMEWORK C IST CLASSIFIED THE PROVISIONING SECURE HARDWARE AND SOFTWARE INTO FIVE N FUNCTIONS a. Identify i. Develop security policies and capablilties b. Protect i. Intstall, operate, and decommission it hardware and software c. Deteck i. Perform ongoing proactive monitoring d. Respond i. Intensify contain and eradicate threats e. Recover i. Restore systems and data Security control categories a. Three main categories i. Technical 1. Control is implemented as a system a. Firewalls ii. Operational 1. Implemented by people a. Training programs iii. Managerial 1. Oversight of the informational systems VULERNABILITY, THREAT, AND RISK a. Vulnerability i. Weakness that can be triggered b. Threat i. Potential for vulnerability to be exploited c. risk i. Likelihood and impact of threat actor exploiting vulnerability Malware A.virus and worms Spread without user authorization B. trojan Malware concealed within legitimate software C. potentially unwanted programs (PUPS) Software installed alongside a install package RANSOMWARE Display threatening messages to extort money. Social engineering a. Phishing i. Tricks the end user into interacting with a malicious resource b. Spear phishing i. Scam specifically toward an end user c. Whaling i. Phishing attack toward executive management Cryptographu a. Plaintext i. Encrypted message b. Ciphertext i. Encrypted message c. Cipher i. Process used to encrypt or decrypt d. Hashing i. Fixed length string for an input plaintext Distributed denial of service attacks DDoS a. Attacker seeks to make a machine network resource unavailable LINUX - reated in 1991 C - Seen in smart cars and home appliances - LINUS TORWALD CREATED IT - FEARED BECAUSE ITS EXTREMELY CUSTOMIZABLE - LI: COMMAND LINE INTERFACE C - LINUX IS OPEN SOURCE - RED HAT, FEDORA, ETC OMMAND USER C $USER #ROOT BASIC COMMANDS - whoami - Prints current user - pwd - Print working directory. Where you are - cd - Change Directory - ls - Lists the content of a directory and potentialy give options to view permissions and hidden files - cat - Used to show the content of a file without editing - touch - Create a blank canvas file - echo - Outputs any text we provide, either displayed or to a file