U2.1 Cables, Hubs, Sniffers

Description

Masters Degree Network Security Mind Map on U2.1 Cables, Hubs, Sniffers, created by Craig Parker on 21/04/2014.
Craig Parker
Mind Map by Craig Parker, updated more than 1 year ago More Less
jjanesko
Created by jjanesko almost 10 years ago
Craig Parker
Copied by Craig Parker almost 10 years ago
11
0

Resource summary

U2.1 Cables, Hubs, Sniffers
  1. Protocol for Ethernet
    1. CSMA/CD
      1. Carrier Sense
        1. before sending, device checks to see if there is another device using network, if yes, it waits
        2. multiple access
          1. any device can use network when it is free
          2. collision detection
            1. after detecting collision, wait a random delay
              1. if collision detected again, wait 2x as long and check (called "expontential backoff")
        3. cabling
          1. thick ethernet
            1. 10BASE 5, 10 Mbps, 500m
            2. thin ethernet
              1. 10BASE2, 10Mbps, 200m
              2. unshielded twisted pair
                1. 10BASE-T, 100-BASE -T, T=twisted pair
                  1. Cat 1 telephone
                    1. Cat 3, 10Mbps
                      1. Cat 5, 100Mbps
                        1. Cat5e, 1000Mbps
                      2. shielded twisted pair
                        1. Used for token ring, good for high interference
                        2. fibre-optic
                          1. 1000 Mbps or higher
                          2. wireless LAN
                            1. Not type of cabling, but often used instead of. 11-150Mbps
                            2. OSI layer 1
                              1. 4 fundamental threats
                                1. information leakage
                                  1. integrity violation
                                    1. denial of service
                                      1. illegitimate use
                                        1. safeguards
                                          1. run cable through protective trunking
                                            1. lockable, dedicated network closets
                                              1. add electromagnetic shielding to cabling
                                                1. run cabling through trunking with pressurized gas, have alarms for pressure loss
                                            2. hubs
                                              1. types
                                                1. dumb
                                                  1. intelligent
                                                    1. regenerate signals for long network cables
                                                      1. monitor congestion, send alarms
                                                        1. remote monitoring
                                                      2. switched network (see note)

                                                        Attachments:

                                                      3. network interface card (NIC)
                                                        1. listening modes
                                                          1. non-promiscuous
                                                            1. only listens to traffic targeted for that device
                                                            2. promiscuous
                                                              1. listens to all traffice on the network
                                                            3. Physical interface that allows a device to listen to network traffice
                                                            4. sniffer
                                                              1. device listening to all traffic on a network
                                                                1. detection
                                                                  1. method 1
                                                                    1. 1.send large volume of packets to non-existing network address
                                                                      1. 2. send an ICMP request to suspect device. If device is sniffing, it will be overwhelmed.
                                                                      2. method 2
                                                                        1. 1. Send packet to unused IP address on network
                                                                          1. 2. Sniff network to see if any devices try to resolve DNS name
                                                                      3. examples
                                                                        1. thin ethernet
                                                                          1. coaxial cable
                                                                            1. build network by daisychaining nodes
                                                                              1. computers connect directly to network cable
                                                                              2. vulnerabilities
                                                                                1. when one cable is damaged, the whole network fails
                                                                                  1. all devices on network receive data
                                                                                    1. easy to attach addtional devices
                                                                                  2. 10BASE-T
                                                                                    1. connects devices to network via hub (see note)

                                                                                      Attachments:

                                                                                      1. vulnerabilities
                                                                                        1. all devices on network receive data (hub broadcasts)
                                                                                          1. easy to attach additional devices
                                                                                      Show full summary Hide full summary

                                                                                      Similar

                                                                                      CCNA Security 210-260 IINS - Exam 1
                                                                                      Mike M
                                                                                      CCNA Security 210-260 IINS - Exam 2
                                                                                      Mike M
                                                                                      SY0-401 Part 1 (50 questions)
                                                                                      desideri
                                                                                      CCNA Security 210-260 IINS - Exam 1
                                                                                      Ricardo Nuñez
                                                                                      CCNA Security 210-260 IINS - Exam 3
                                                                                      irvin pastora
                                                                                      1.3 Network and Security Components
                                                                                      DJ Perrone
                                                                                      U1. OSI 7 Layer Reference Model
                                                                                      Craig Parker
                                                                                      Types of Attacks
                                                                                      River L.
                                                                                      CCNA Security 210-260 IINS - Exam 1
                                                                                      irvin pastora
                                                                                      Network Security Vocabulary
                                                                                      Shantal K Green
                                                                                      CCNA Security 210-260 IINS - Exam 2
                                                                                      irvin pastora