Review of the major Networking topics to guide your studies, and help you pass the CISSP exam.
This...
Video Transcript:
hey I'm Rob Witcher from destination certification and I'm here to helping you pass the cissp exam we're to go through a review of the major topics related to networking in domain 4 to understand how they interrelate and to guide your studies this is the second of four videos for domain 4 I've included links to their mindmap videos in the description below these mindmap videos are one part of our complete cisp Master [Music] Class continuing our discussion from The OSI model in the previous video we're now going to dig into a bit more detail around networking Concepts such as wide area networks wireless IP addressing authentication Network attacks virtualization and some common tools and we'll start with wide area networks networks that are spread over a large geographical area an entire country continent or World there are a few protocols the have been created over the years to enable wide area networks that you should know about x25 was one of the first protocol Suites for packet switched networks across a w a wide network x25 was first published back in 1976 meaning it came out even before IP version 4 and the OSI model frame relay mostly replaced x25 ATM asynchronous transfer mode then mostly replaced frame relay and MLS multiple protocol label switching which can encapsulate various protocols including frame relay and ATM has become the dominant wide area network protocol today now on to wireless we are relentlessly marching towards our wireless future can you even remember the last time you used a phone that was plugged into your wall and used a landline to call someone remember when our computers used to have a plethora of ports on them like look at all the stuff you could plug in now you get this and you should you count yourself lucky that you still have a headphone jack there nowadays you either Go Wireless with everything or welcome to dongle hell one of the biggest challenges with wireless is that signals are much more easily intercepted instead of having to physically break into a building to connect to the corporate Network you can now just sit in the parking lot in your van and hack the planet encrypting Wireless traffic is therefore extremely important so let's talk about some of the various Wireless technologies that we use every day and the security challenges associated with them let's start with Wi-Fi a technology which we pervasively use to create local area networks without any wires well you need to plug your W your Wi-Fi access point into a physical network but let's not get pedantic here I E The Institute of electrical and electronic Engineers 802. 11 is the protocol we use for wireless local area networks there have been many generations of 802. 11 ratified over the last 20 plus years you should recognize the following 80211 standards 802.
11a 802. 11b g n a and ax these different versions of 80211 represent the evolution of the standard towards ever greater bandwidth and capabilities as I mentioned it is critically important to encrypt Wireless traffic as it is so much easier to EAS drop on a wireless network one of the first wireless encryption protocols created was web wired equivalent privacy weap absolutely does not live up to its name very significant flaws have been found in the weap algorithm related to how it implements the rc4 encryption algorithm to encrypt Wireless traffic specifically the initialization vectors used are far too short meaning that web encryption can be easily broken as such weap should never be used this was a huge problem when it was first discovered and a bad a solution needed to be quickly found to crop up weap until new wireless encryption protocols could be created and ratified the Band-Aid solution that was created for web was tkip temporal key Integrity protocol tkip has subsequently been found to also have significant flaws and should therefore not be used WPA Wi-Fi protected access was also meant as an interm protocol to help deal with the web Fiasco until the next much better protocol WPA2 could be ratified WPA uses tkip for encryption by default WPA 2 uses the AES encryption algorithm by default and AES is much better than tkip Wi-Fi is used for creating local area networks with a range of about 100 meters y Max Wireless interoperability for microwave access is a protocol for creating Wireless metropolitan area networks wireless networks that range up to 90 km the i e standard behind YX is 802. 16 now let's talk about a couple of protocols used for mobile phones GSM global system for mobils and CDMA code division multiple access are W both wireless radio protocols used for cellular companies to provide 2G and 3G voice and data services GSM has a couple of significant security issues that are worth noting it is vulnerable to man in the middle attacks an attacker can create a rogue cell tower which phones will connect you allowing the attacker to intercept it is also possible to clone Sim subscriber identity module cards by extracting a user's imsi International mobile subscriber identity allowing an attacker to make calls and receive calls and also receive a user's SMS messages this SMS cloning attack can be done over the air GSM and CDMA have largely been replaced by 4glte and now of course we have 5G networks microwaves are not just for unevenly heating your Hot Pockets microwaves are also a good way of coste effectively creating data links between buildings that are a few miles apart now let's talk about the major way that we can ensure data sent across a network gets to the intended destination one more time IP Internet Protocol addresses as I mentioned in the previous video it is useful to think of an IP address as being similar to a post address for a house if you want to send someone a letter through the mail you need to add add and that address needs to be unique to them IP addresses serve the same function on a network the pervasively used version of Ip currently is version 4 it's worked great for decades but there are some big limitations the address space the total number of unique IP addresses is only 2 to the power of 32 or 4 billion 294 m967 and 296 possible addresses when IP for was when IP version 4 was first ratified back in 1974 and there was no internet 4.
3 billion addresses probably sounded like an absurdly large number that we would never run out of but here we are in 2023 with over 7 billion people on the planet and many of us using multiple IP addresses I just checked I'm currently using 67 IP addresses on my little home network easy granted I'm a wee bit of a nerd the point stands though 4. 3 billion IP addresses are not nearly enough plus IP version 4 has no security built into it IPv6 addresses both of the problems just mentioned with IP version 4 the address bace for IP version 6 is 2 to the power of 128 or 340 undecillion possible addresses that's this number here by the way actually it's not 340 unilan is actually this number here it's a very very large number we should be good for at least a couple more years with this many addresses once the internet manages to switch over to IP version 6 that is another big advantage of IP version 6 is that capabilities for encryption and integrity checking are built right in whereas with IP version 4 we had to duct tape these capabilities on later the IP version 4 addressing system is divided into five classes of IP addresses you don't need to be able to calculate subnet masks but you should be able to recognize these five classes and the number of address in each class class A networks provide two to the power of 24 addresses 16,777,216 usable addresses Class B provides two to the power of 16 addresses 65534 usable addresses and Class C provides two to the^ of 8 addresses which is 254 usable addresses the final piece that you should remember related to IP version 4 addresses is that three ranges of addresses have been reserved for use in private networks home networks corporate networks Etc the entire 10. range the 17216 to 17231 range and the 192.