Ebook - CISSP - Domain - 04 - Communication and Network Security
Ebook - CISSP - Domain - 04 - Communication and Network Security
Kevin, who is preparing for his CISSP exam, read an internal case file on a
recent spam attack on Nutri Worldwide Inc.
At the Minnesota plant, a vendor who had visited the plant used his laptop to
complete a few transactions. He connected to the wireless after taking approvals.
He used his flash drive to backup the transactions. The flash drive had viruses,
and these entered the network through his laptop, causing the local server to
crash. This had far-reaching effects.
Cyber Kill Chain Activities
Source: https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/Gaining_the_Advantage_Cyber_Kill_Chain.pdf
https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
Assess and Implement Secure Design Principles in
Network Architecture
Introduction to Secure Network Architecture and Design
OSI Model
OSI Model
Data Application
7 7
• The four lower layers (transport, network, data
Presentation
link, and physical) are concerned with the flow of Data 6 6
The seven layers in the OSI model and their functions are as follows:
The following illustration explains how data travels in the OSI model:
Network topology defines the way the network devices are organized to facilitate communications.
• Logical link control (LLC) layer: It controls frame synchronization, error check, and flow.
Example: Address Resolution Protocol (ARP), Serial Line Internet Protocol (SLIP),
and Point-to-Point Protocol (PPP)
A
1 ARP cache is checked
Address resolution protocol helps match an IP ARP entry is checked 5
2 ARP request is sent
address to a Media Access Control (MAC) address. IP packet is sent 6
Network layer defines how the small packets of data are routed and relayed between end systems on
the same network or on interconnected networks. Network layer:
• Defines the most optimal path the packet should take from the source to the destination
• Defines logical addressing so that any endpoint can be identified
• Handles congestion in the network
• Defines how to fragment a packet into smaller packets to accommodate different media
• Manages message routing, error detection, and control of node data traffic
• Is primarily responsible for routing
Examples: IP, OSPF, ICMP, and RIP
• Provides services to the transport layer
Types of IP Addressing
Packet sent to
Packet sent to Packet sent Packet sent to
a group of
a single IP only to the a network’s
nodes on
address nearest group broadcast
different
destination of nodes address
networks
Internet Control Message Protocol (ICMP)
Internet protocol is a network layer protocol which handles addressing and routing.
Dynamic Routing
Protocols
Transport layer defines how to address the physical locations and devices on the network, how to
make connections between nodes, and how to handle the networking of messages.
Segments Segments
Transport Transport
Layer Layer
To network Layer From network Layer
Transport Layer
A TCP three-way handshake is used to create a connection between a local host or client and server.
SYN
Send SYN SYN received
SEQ=100, CTL = SYN
SYN/ACK
SYN received Send SYN, ACK
SEQ=300, ACK=101, CTL = SYN, ACK
ACK
Established
SEQ=101, ACK=301, CTL = ACK
Connection Established
CTL = Which control bits in the TCP header are set to 1 Server
Client
User Datagram Protocol (UDP)
TCP UDP
Data Data
Session layer makes the initial contact with other
computers and sets up the lines of communication.
• The session layer offers three different modes: Session Session
layer layer
o Simplex
Syn Syn Syn Syn Syn Syn
o Half duplex
o Full duplex
• Presentation layer presents data and provides services to the application layer.
• It is responsible for defining how information is presented to the user in the interface (application layer)
that they are using.
• This layer provides a common means of representing data.
• It acts as a translator, no protocols work in this layer
• It is not concerned with the meaning of the data but with the syntax and format of the data.
L7 data L7 data
Presentation Presentation
layer layer
Encoded, encrypted Decoded, decrypted and
and compressed data
H6 H6
decompressed data
L6 data L6 data
• Protocol conversion
Presentation Presentation
• Data translation layer layer
Encoded, encrypted and Decoded, decrypted and
• Compression compressed data
H6
decompressed data
H6
• Encryption
• Character set conversion
L6 data L6 data
To session layer From session layer
Application Layer
• Application layer supports the components that deal with the communication aspects of an application.
• It is at this point that the data is in a visual form a user can truly understand rather than binary zeros
and ones.
• It does not include applications, rather only protocols that support the applications.
• It deals with properly processing and formatting the data before it moves to the layer below.
Application letter
User User
Application Application
layer layer From Presentation layer
To Presentation layer
Application Layer
TCP/IP is the common name for the suite of protocols originally developed by
the Department of Defense (DoD).
Network
Controls the hardware devices and media that make up the network
Access
Network Access Layer
• The host and the network data exchange are monitored by this layer.
• OSI layer’s physical and data link layers match this layer.
Network Access
Layer • It defines protocols for the physical transmission of data and oversees
hardware addressing.
Example: Ethernet and Point-to-Point Protocol (PPP)
Internet Layer
• The OSI application, presentation, and session layers match with this
Application Layer
layer.
The TCP/IP model is very similar to the OSI model, however with fewer layers.
Application Layer
Presentation Layer
Application Layer Telne SNM
FTP SMTP DNS RIP
t P
Session Layer
Transport Layer
TCP UDP
Host-to-Host
Network Layer
Transport Layer
IGMP ICMP
ARP IP
Data-Link Layer Internet Layer
Token Frame
Network Interface Ethernet ATM
Physical Layer Ring Relay
Layer
Introduction to IP Addressing
There are two versions of IP in use, IP Version 4 (IPV4) and IP Version 6 (IPV6).
Example: 192.168.0.100
Classful IP Addressing
Class E Reserved for future use, research, or development purpose 240.0.0.0 255.255.255.255
Class A
Subnet Numberofof
Number Hostsper
Hosts per Start
Start
Class Subnet mask
Class End
End address
address
Class B is a 16-bit network address. mask networks
networks network address
network address
• Has 16-bit host address Class A 255.0.0.0 128 16 million 0.0.0.0 127.255.255.255
Class A 255.0.0.0 128 16 million 0.0.0.0 127.255.255.255
• IP ranges from 128.0.0.0 to
Class B 255.255.0.0 16,000 65,000 128.0.0.0 191.255.255.255
191.255.255.255 Class B 255.255.0.0 16,000 65,000 128.0.0.0 191.255.255.255
Class C 255.255.255.0 2 million 254 192.0.0.0 223.255.255.255
• Implied net mask is 255.255.0.0 Class C 255.255.255.0 2 million 254 192.0.0.0 223.255.255.255
• Contains 65,534 nodes Class D Reserved for multicast group 224.0.0.0 239.255.255.255
Class D Reserved for multicast group 224.0.0.0 239.255.255.255
• 16,382 networks created ClassEE
Reservedfor
Reserved forfuture
futureuse,
use,research,
research,or
or
240.0.0.0 255.255.255.255
255.255.255.255
Class developmentalpurposes
purposes 240.0.0.0
developmental
Class C
255.255.255.255 Class E
Reserved for future use, research, or
240.0.0.0 255.255.255.255
developmental purposes
Classless Inter-Domain Routing
Classless Inter-Domain Routing (CIDR) is a method for allocating IP addresses and routing
Internet Protocol packets.
• CIDR intends to slow the growth of routing tables on routers across the Internet and to
help slow the rapid exhaustion of IPv4 addresses.
• CIDR disposes the rigid scheme of class A, B, and C networks.
• CIDR permits the creation of variable length subnet mask from 8 bits to 31 bits.
• CIDR leads to an efficient allocation of the available IP addresses on Internet.
• CIDR notation is a syntax for specifying IP addresses and their associated routing prefixes.
Example: 192.168.1.3/23
Private Networks and Loopback Address
Public
Public
Address
Address
Public Public
Internet
Address Address
Public
Boundary Isolated network
Address
Public
Address
Private Networks and Loopback Address
Search
IPv6
Hexadecimal Format
• An IPv6 address is made of 128 bits divided into eight 16 bit blocks.
• Each block is then converted into 4 digit hexadecimal numbers separated by colon symbols.
• For example, given below is a 128-bit IPv6 address represented in the binary format and
divided into eight 16-bit blocks:
o 0010000000000001 0000000000000000 0011001000111000 1101111111100001
0000000001100011 0000000000000000 0000000000000000 1111111011111011
• Hexadecimal equivalent of an IPv6 above 128 bits is
2001:0000:3238:DFE1:0063:0000:0000:FEFB.
• Even after converting into the hexadecimal format, IPv6 address remains long.
IPv6 Address Structure
Node or device
IPv6 Address Types
• An IPv6 global unicast address (GUA) is a • A unicast address that is local only on that
globally unique and routable IPv6 address link. The term link refers to a logical network
segment or a subnet
• Equivalent to a public IPv4 address
• Limited to the link and are not routable
• Begins with either a hexadecimal 2 or 3.
beyond the local subnet
• GUA can be either a source or destination
• Typically created automatically by the host
IPv6 address
operating system
• Example of a global unicast address:
• Can be either source or destination IPv6
2001:db8:cafe:1::100
addresses
• Usually begin with fe80. Example:
fe80::a299:9bff:fe18:50d1
6to4 Tunneling Method
• It is a system that allows IPv6 packets to be transmitted over an IPv4 network without the
need to configure explicit tunnels.
• 6to4 is simply a transparent mechanism used as a transport layer between IPv6 nodes.
• 6to4 does not facilitate interoperation between IPv4-only hosts and IPv6-only hosts.
• 6to4 performs three functions:
o Assigns a block of IPv6 address space to any host or network that has a global IPv4
address
o Encapsulates IPv6 packets inside IPv4 packets for transmission over an IPv4 network
using 6in4
o Routes traffic between 6to4 and native IPv6 networks
IPv6 Vs. IPv4
IPv6
IPv6 IPv4
IPv4
Transport Mode
IP TCP
IP Data Payload
Packet Header Header
Encrypted
Authenticated
IPsec Modes: Tunnel Mode
Tunnel Mode
IP TCP
IP Data Payload
Packet Header Header
Encrypted
Authenticated
IPsec Security Protocols: Authentication Header (AH)
AH is an authentication protocol.
• It provides authentication and integrity for every Original IP Packet
packet of network data. IP header IP Data
• It acts as a digital signature for the data.
AH in transport mode
• Confidentiality is not offered. IP header AH header IP Data
header.
Encrypted
• All data is encrypted and or or authenticated after
Authenticated
the ESP header.
Components of IPsec Process: SA and ISAKMP
Internet Security
Association and • Manages the SA process
Key Management • Provides a key exchange framework
Protocol (ISAKMP)
Components of the IPsec Process: IKE
To improve the security of the communication channels, Hilda Jacobs was asked
to provide suggestions for securing communication. Kevin worked with Hilda on
this assignment, and they produced their report.
The report suggested that all site-to-site communication over the public network or
internet should use IPSec. Administrators will have to use SSH instead of Telnet for
the administration of network devices or servers over the network. SSH provides
more a secure communication channel as compared to Telnet.
To improve the security of the communication channels, Hilda Jacobs was asked
to provide suggestions for securing communication. Kevin worked with Hilda on
this assignment, and they produced their report.
The report suggested that all site-to-site communication over the public network or
internet should use IPSec. Administrators will have to use SSH instead of Telnet for
the administration of network devices or servers over the network. SSH provides
more a secure communication channel as compared to Telnet.
LAN
Server
Fibre Channel
Lossless
Driver
Ethernet
CNA
TCP/IP protocol suite consists of various layers with many individual protocols
and is also known as Multi-layer protocol.
Advantages Disadvantages
Benefits of micro-segmentation:
Application Layer
Business Applications
Control Layer
SDN Control
Software Network Services
Application Layer
Northbound
APIs
Control Layer
Network Controller
Southbound
Infrastructure Layer API
Programmable Switches
Software-Defined Wide Area Network (SD-WAN)
Source: https://www.gartner.com/imagesrv/media-products/pdf/cisco/Cisco-1-5W2DWHZ.pdf
Software-Defined Wide Area Network (SD-WAN)
Characteristics
REMOTE RETAIL
LOCATION STORE
DATA CENTER
HEADQUATERS
Source: https://www.bboxservices.com/resources/blog/bbns/2019/05/24/what-is-sd-wan-and-why-is-it-so-important
Wireless Technologies
The two different spread spectrum technologies for 2.4 GHz wireless LANs are:
B2
m2
Base Station R2
Relay Station
Cell Phone
Source: https://arxiv.org/pdf/1406.5258.pdf
Cellular Wireless Technologies
Generation 1G 2G 3G 4G 5G
Data rate 14.4 Kbps 64 Kbps 2 Mbps 100-300 Mbps 1-10 Gbps
HD video, web
Purpose Voice calls SMS, MMS Video calls IoT
conferencing
Content Delivery Network (CDN)
A Content Delivery Network (CDN) is a large, geographically distributed network of specialized servers that
accelerate the delivery of web content and rich media to internet-connected devices.
Content Delivery Network (CDN)
Benefits of CDN :
Performance Availability
Benefits of CDN :
Security Intelligence
• Most CDNs should protect content • CDN can also offer valuable analytical
providers and users by mitigating against information to discover trends about end
a wide array of attacks including DDoS user connectivity, device types, and
attacks and web-based exploits (SQL browsing experiences across the globe.
injection, cross-site scripting, and local or
remote file-inclusion attacks). • This data can give critical, actionable
insights, and intelligence into their user
base.
Without CDN
Source: https://img-medianova.mncdn.com/wp-content/uploads/sites/8/2020/05/cdn3.png
With CDN
• When using a CDN, edge servers distribute static website data to visitors that are close to
their geographic region.
• The connection is fast because it’s between Internet nodes that are close together.
• This means fewer hops and a faster flow of data.
Source: https://img-medianova.mncdn.com/wp-content/uploads/sites/8/2020/05/cdn3.png
Secure Network Components
Root of Trust
Source: https://aws.amazon.com/blogs/iot/using-a-trusted-platform-module-for-endpoint-device-security-in-aws-iot-greengrass/
Root of Trust
Source: https://aws.amazon.com/blogs/iot/using-a-trusted-platform-module-for-endpoint-device-security-in-aws-iot-greengrass/
List of Networking Devices
The different types of networking devices that coexist on the internetwork are:
Wireless Access
Switches Routers
Points
• Operate in the data link • Operate at the network • Operate at the data link
layer, OSI layer 2, and layer, layer 3, of the OSI layer, OSI layer 2, and
network layer, OSI layer 3 model network layer, layer 3
• Sends the data packet only • Add more intelligence to • Allow wireless devices to
to the specific port where the process of forwarding connect to a wired
the destination MAC packets network using Wi-Fi,
address is located bluetooth, or related
standards
WAN Switching and Devices
Twisted pair consists of two insulated wires that are arranged in a regular spiral pattern.
Twisted pair consists of two insulated wires that are arranged in a regular spiral pattern.
Fiber-optic cable box is a physical medium that can conduct modulated light transmission.
Fiber-optic cable box is a physical medium that can conduct modulated light transmission.
Ethernet switch
Source: https://www.tp-link.com/us/configuration-guides/configuring_802_1x/?configurationId=18220
802.1x Architecture
EAP
Computers
Microsoft AD
Wired Access
Switches
EAP
Non-Supplicant’s
Devices (Printers)
Source: https://sudonull.com/post/31574-Configuring-8021X-on-Cisco-Switches-Using-Failover-NPS-Windows-RADIUS-with-AD
Endpoint Security
Endpoint security is the practice of securing endpoints of user devices such as desktops, laptops, and
mobile devices from cyberattacks.
Features:
2011
Enterprise Mobility
Management (EMM)
Unified Endpoint
• App management
Management (UEM)
• Managed configurations 2014 2018
All business devices
• Email management
including IoT
• Secure content
management
Unified Endpoint Management
Unified Endpoint Management (UEM) is an approach to securing and controlling mobile devices, such
as smartphones, tablets, and laptops, in a connected, cohesive manner from a single console.
Network Configuration
Management
BYOD Application
Containers Management
UEM
Security
Content
Management
Management
Source: https://www.hexnode.com/blogs/what-is-unified-endpoint-management-uem/
Network Address Translation
Network Address Translation (NAT) converts a private IP address of the inside, trusted
network to a registered real IP address seen by the outside, untrusted network.
The Internet Assigned Numbers Authority (IANA) has reserved three blocks of
the IP address space for private Internet addresses:
Voice over IP (VoIP) is a category of hardware and software that enables people to use the Internet
as the transmission medium for telephone calls by sending voice data in packets using IP.
VoIP combines many types of data, such as voice, audio, and video, into a single IP packet
Session Initiation Protocol (SIP)
Session Initiation Protocol (SIP) is an application layer protocol used for initiating, maintaining, and
terminating real-time sessions that include voice, video, and messaging applications.
• Vishing
• Eavesdropping
Packet-Filtering
Routers Packet-Filtering Screened Server
Routers
Internet Internet
Packet filtering firewall examines the source and destination address of the
incoming data packet. A packet-filtering router:
Application-level gateway usually is a host computer that runs proxy server software.
Stateful inspection or dynamic packet filtering firewall intercepts the incoming packets at the
network layer and uses an inspection engine to extract state-related information from upper layers.
Remote access technologies can be defined as the data networking technologies that are uniquely focused
on providing access to the remote user into a network.
A Virtual Private Network (VPN) is a private network that uses a public network (usually the
Internet) to connect remote sites or users together.
Internet
Regional
Office Head Office
Regional
Office
• VPN is the tunnel that connects the user to the VPN server.
• To keep each data packet secure, it gets wrapped in an outer packet which is encrypted through a
process known as encapsulation.
• This outer packet keeps the data secure during the transfer.
• At the VPN server, the outer packet is removed, to access the data of the inner packet.
3 1 3 1
2 2
3 1 3 1
2 2
Source Decryption
Encryption
Destination
VPN Tunnel
Types of VPN: Site-to-Site
Site-to-site VPNs, or intranet VPNs, allow a company to connect its remote sites to the corporate
backbone securely over a public medium like the Internet.
VPN VPN
Lan Gateway Internet Gateway Lan
VPN Tunnel
Types of VPN: Host-to-Host
A host-to-host VPN is somewhat like a site-to-site in concept except that the endpoints of the tunnel
are two individual hosts.
Host-to-site or remote-access VPNs allow remote users like telecommuters to securely access the
corporate network wherever and whenever they need to.
VPN Tunnel
Home User /
Remote Access
VPN Client
VPN Protocols
The following are the five VPN protocols, their advantages, and disadvantages:
PPTP
L2TP/IPSEC
• Developed by Microsoft
OpenVPN
VPN Protocols
The following are the five VPN protocols, their advantages, and disadvantages:
PPTP
The following are the five VPN protocols, their advantages, and disadvantages:
PPTP
L2TP/IPSEC
• Developed by Microsoft
OpenVPN
VPN Protocols
The following are the five VPN protocols, their advantages, and disadvantages:
PPTP
OpenVPN
VPN Protocols
The following are the five VPN protocols, their advantages, and disadvantages:
PPTP
• Open-source protocol
L2TP/IPSEC
• Runs on UDP and TCP protocols
• Has a highly reliable OpenVPN TCP protocol
SSTP
• Lower latency and faster speed for OpenVPN UDP protocol
Telepresence
Network Function Virtualization
Reduced CapEx
and OpEx Greater flexibility
Improved
through reduced and accelerated
Reduced vendor Faster time to scalability and
equipment costs time to market
lock-in deployment resource
and reduced for new products
management
power and updates
consumption
Network Attacks
Types Description
This attack is an attempt, on the part of the attacker, to incapacitate a target system or
DOS or DDOS
resource.
The attacker sends mangled packet fragments with overlapping and oversized payloads
Teardrop
to a target system.
Ping of Death The attacker sends a ping packet of length 65,535 bytes to the target system.
It is a Denial-of-Service attack, where the attacker sends many SYN packets to the target
SYN Flood
system.
An attacker attempts to hijack or disrupt an existing TCP session by injecting packets
Sequence Number
that pretend to originate from one of the two computers in the session.
Smurf This attack consists of numerous forged ICMP echo requests.
This is a computer hacking attack, where the data is introduced into a Domain Name
DNS Poisoning
System (DNS) name server's cache database.
Network Attacks
Types Description
Worm A worm is a type of malware that has the means for automatic self-replication.
Spam Spam greatly adds to the volume of email traffic on the Internet.