7 hours 35 minutes
Hey, guys. Welcome to another episode of the S S C P Exam Prep series. I'm your host, Peter Simple. Look, this is going to be the eighth and last lesson off the sixth of May.
So far in the six domain, we've seen a bunch of things related networking. We've taken a look at the O. S I and TCP ikey models I p networking and how information is sent across the network. We've taken a look at network apologies, different frameworks that networks were based on.
We've taken a walk at D and S and El Bab,
which are used to acquire information for the first time. We've taken a look at some commonly used ports and protocols for different surfaces. We've looked at Tel communications and how they interact with networks. We've seen how it's important to control network access and
be sure of what's coming in and out of your network.
And we've also taken a look at multimedia service's and technologies of things like remote meeting technology, instant messaging and how they're integrated within the network. And finally, at last in this lesson, we will take a look at network based security devices and how they provide
end and security across the network.
Let's get started
when it comes. The network security three. Importance of defense and death cannot be stressed enough. It's very important to have multiple layers of network security simply because there are so many things going on. The network.
Horribles are one way off. Implementing network security firewalls are considered to be a gateway protection device. They are designed to examine the flow of traffic that's coming in and out off the network, and they're also designed to,
ah, block any traffic that is
not good or malicious. Far balls usually act by a rule set so you can configure different rules as to what's allowed and what's not allowed. And then the firewall will filter all incoming traffic from there.
What if our walls also do is they can change the source i P addresses for outgoing traffic. This is known as network address translation, also known as Nat. Basically, when the
computer from inside the network sends information out through the fireball,
the far wall will change the I P address to protect the network address of the computer and thus at another layer of defense,
proxies are considered to be another type of Gateway protection device. The main job proxy is to mediate communications between trusted and untrusted endpoints.
When information more alas, gets sent to a proxy machine and the proxy server war machine can then send it to where it's supposed to go.
Now there are two different types of proxies. There's the Circuit proxy, which allows trusted host to talk with untrusted points. So instead of having that communication where you're sending information directly from a computer in your network
or something that you trust, you consented to the proxy machine. And then the proxy server
will take hair off, sending the network traffic to wherever it's supposed to go.
Proxy servers are often police at Internet gateways to hide internal network behind one i p. Address and to prevent direct communication between internal and external host.
The others is a application level process. This relays information between two end points with a specific application.
Now there, of course, there are all kinds of network attacks, one of them being on denial of service. Watch, obviously, is an attack which nice service is do a computer by overloading it with traffic. It's when multiple computers tried to make a request to another computer or server looking for information
at the same time.
And there's so many of them that thesis server can't respond to all of them and so just shuts down. It just it just becomes this able Now there's several types of denial of service. There's really volume based attacks, protocol attacks. An application layer attacks
some of the most common
specific attacks of denial of service on beast race. So the first is sin flooding. So this is an attack against the initial handshake in a TCP connection.
Remember when we said that in order to set up a TCP connection, the client sends a sin request to the server and the server response with a similar class and an acknowledgment that it received a request to begin with? That's how it starts well, and this denial of service attack.
There are so many cynic Wes hitting
ah server that it can't respond to them all and just kind of should just kind of stopped processing anymore because there's so many. So when the legitimate users try to access the server, then they won't be ableto
Now. There's also Smurf and Fraggle attacks, which more or less follow the same methodology. But just use a different protocol server attacks to use Internet control, message protocols and fraggle attacks use UDP protocol.
So the way this works is an attacker sends a request
to ace with us with us with the fake source i p
the store side pee off the target and they send it through the network to the broadcast networks. So when they send it to the broadcast I p. Address that that I p address will then send it to every single computer in the network.
So when you send an actor replaced every single computer in the network, all of the computers that are one which we most of them, if not all of them will send a echo request back saying that, you know, Hey, yes, we're on. Well, when they send everyone, all of the computers send the echo request back through the network,
they all go to the
source i p. The one that was spoofed and they all hit the target. And there's so many requests that the computer, the target really just can't keep up with it
spoofing the active, Impersonating someone even if you are not them. Obviously the most common types of spoofing our I p address proofing, email spoofing and d and s briefing. So in this example, we have a quick a little d n s spiffing diagram here. That's when the client wants to send
our quest to a real website because they want to access. I could be anything could be Google
ESPN, but the attacker will inject a big D and s entry, so ah, fake I d. And s entry of fate I p will be return, which will then send Thekla I in't to a fake website instead of the real Lipsyte
Wireless Technologies. There are tons of them
tons of their tons of things connected to a WiFi and the sailor networks having the most common, obviously a WiFi, Bluetooth and cellular and the thieves were great networks. But the problem is, the transmission of secured
wireless networks are only a strong is their authentication methods and protocols. And in some cases, the authentication methods and protocol aren't very strong at all.
So lessons and issues well, the open system authentication is the default authentication protocol for the eight or 2 11 standard. Now the 802 11 standard simply just means it's like the family specifications off wireless networks
open a system. Authentication can be combined with things such as Web, which is the worId equivalent Pro Privacy Protocol and W P A and W P A. Two. I'm sure you're seeing a bunch of these when you try to connect to WiFi and either a building or
in your organization and might ask you to pick a security, tell you
and then if you have, it gives you a drop down menu, and you see some of these drop downs that appear
now. Webb is, ah, very basic security feature, and it's actually very insecure, and you shouldn't use it all W p A and W P A. Two are better, and they improve usual authentication and data encryption.
The View p A. To is the normal standard that everyone should be using in terms off. Wireless security,
like many things, are security. Wireless security is subject to attack. Some of the most common ones are the parking lot attack where organ Our Attackers tried to sit near organization and try to access internal hosts, feed the wireless network. So when there's wireless networks in a building,
they wireless networks aren't merely confined
to just the scope of the building right. The wireless network will go out in a circle spreading
fairly or beyond beyond the actual building. So it's impossible for Attackers to sit in the parking lot of an office building and still get access to the WiFi in there.
There's also shared key authentication fall. This is really a passing attack that allows eavesdropping on both the challenge and the response. When authenticating to a wireless network, it'd be very easy to break the encryption,
depending on the time of wireless security that are you are using
and the service set identify, I says. I default. This is where Attackers can attack access points due to the default configuration. When you have the generic name on your rat WiFi, it basically tells you what the default configuration is, and then from their Attackers can
leverage different kind of
attacks to get into your access point.
In today's lecture, we discussed network based attacks and wireless technologies.
An attack which deny service is to a computer by overloading it with traffic,
is a spoofing
be flooding. See denial of service.
De shared key authentication fall
If you said, see denial of service that you are correct.
Remember, the Nile service happens when there are so many requests or so much information being sent to a computer. That, except we cannot process anymore. And it just stopped processing everything.
Thanks for watching guys. I hope you learned a lot in this lesson and I'll see you next time.
ISC2 Systems Security Certified Practitioner (SSCP) Practice Assessment
The SSCP exam preparation package helps students prepare for the ISC2 SSCP certification exam. ...
(ISC)2 Certified Information Systems Security Professional 2015
(ISC)2 Certified Information Systems Security Professional 2015 is a practice exam preparing for the CISSP ...