CISSP Introduction Module

CISSP Module 01

CISSP Module 02

CISSP Module 03

CISSP Module 04

CISSP Module 05

CISSP Module 06

CISSP Module 07

CISSP Module 08

CISSP Module 09

Part 14 – WAN

Invite Friends
Facebook Twitter Google+ LinkedIn Email
Virtual Practice Lab
Practice Test
Part 14 – WAN

Though topics surrounding WANs (Wide Area Networks) has fallen off in terms of testability, it is still a subject area worth knowing. This section deals with the major forms of WAN connectivity types and protocols.

We begin by covering the two types of WAN switching technologies: circuit switching and packet switching. Circuit switching networks send data over the exact same path for all transmitted data. It can be viewed as a direct connection between to endpoints very much like a landline phone connection, which in fact, is an example of a circuit-switched network. Other types of circuit switching networks are ISDN, DSL, and the T-Carriers such as T-1, T-3, etc.

It is noted that all though dial-up networking using modems has pretty much disappeared, there are still applications that utilize this type of connection. A prime example is remote access applications. It is also pointed out that ISDN is not really testable, so don’t worry too much about knowing the ins and outs. The reason for this is that ISDN has been pretty much supplanted by ADSL, which achieves a faster download speed by trading off for a slower upload speed.

Threats targeting circuit-switched networks are then covered. The technique of war dialing is employed against remote access networks which use dial up connections. Several strategies for mitigating war dialing attacks are discussed such as implementing dial back, caller id, and combining strategies into a layered defense.

Packet switching is covered next. In packet switching, data is “chunked” into packets and each packet finds its own best way to the destination. This results in faster data delivery. Examples of packet-switched networks are x.25, frame relay, ATM (Asynchronous Transfer Mode), VOIP, and cable networks.

We then discuss some of the threats that target packet-switched networks. One of the major benefits of cable networks – an always on connection – is also a major vulnerability.

VOIP is vulnerable to some of the same exploits as POTS (Plain Old Telephone System) networks such as phishing, known as “vishing” for VOIP. It is also susceptible to eavesdropping, toll fraud, and SPIT (Spam Over IP Telephony).

In addition, performance issues exist with VOIP such as latency and jitter. It’s important to be aware that VOIP was never designed to be secure. Protocols such as S/RTP (Secure Real Time Protocol) can be used as a mitigation tactic against some of these threats.

Watch the Course Intro Video
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google PlayGet it on the App Store
Practice Labs and Exam Vouchers

Congratulations! You're taking the first step to getting certified. Get some hands on experience with available practice labs OR save some money, support Cybrary, and purchase discounted exam vouchers. Ready to earn your next industry certification? Join cyber security's largest community and start learning today.


Upcoming Industry Events

Get more out of Cybrary
Reach an audience of 1,500,000+ IT and cyber professionals, including the world's top companies
Create impact at a scale by reaching a global audience
Build your personal brand
Supplement or replace your income (average instructor makes ~$1,000 - $2,000/month)
Access the world's largest talent pool of cyber security professionals, and receive candidates with pre-assessed technical skills
Eliminate the pain and costs of technical vetting
Receive candidate skill profiles highlighting knowledge and technical proficiency
Reach active and passive candidates; and, fill your pipeline with pre-vetted, qualified cyber professionals
Get a Job
Work with a dedicated mentor to help you select the career that's right for you, and get a job at one of the world's top companies.
Receive all the training and assessments you need to prepare for the job
Work with a dedicated Mentor
Get placed through Cybrary for jobs earning average salaries of $116,000/yr

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?