CISSP Cram Sheet: Compiled by: Jason Robinett, Ascend Solutions Last Updated 4/10/02 NOTE: This guide does not replace in any way the outstanding value of the ISC2 CISSP CBK Seminar, nor the fact that you must have been directly involved in the security field or one of the 10 domains of expertise for at least 3 years if you intend to take the CISSP exam. This booklet simply intends to make your life easier and to provide you with a centralized and compiled list of resources for this particular domain of expertise. Instead of a list of headings, we will attempt to give you the headings along with the information to supplement the headings. As with any security related topic, this is a living document that will and must evolve as other people read it and technology evolves. Please feel free to send comments and input to be added to this document. Any comments, typo correction, etc… are most welcome and can be sent directly to jasonr@ascendsolutions.com. Thanks. Domain 2 – Telecommunications & Network Security Domain Definition: Telecommunications and Network Security domain encompasses the structures, transmission methods, transport formats, and security measures used to provide integrity, availability, authentication, and confidentiality for transmission over private and public communications networks and media. The candidate is expected to demonstrate an understanding of communications and network security as it relates to voice communications; data communications in terms of local area, wide area, and remote access; Internet/Intranet/Extranet in terms of Firewalls, Routers, and TCP/IP; and communications security management and techniques in terms of preventive, detective and corrective measures. ISO/OSI Model – Is the standard model for network communications (Please Do Not Throw Sausage Pizza Away). Layers & Characteristics Application – Provides specific services for applications such as file transfer Examples: FTP, TFTP, HTTP, SNMP, SMTP Presentation – Provides data representation between systems Examples: JPEG, GIF, MPEG, MIDI Session – Establishes, maintains, & manages sessions as well as synchronization of the data flow Examples: NFS, RPC, X Windows, AppleTalk Transport – Provides end-to-end transmission integrity Examples: TCP, UDP, IPX Network – Switches and routes information units. Determines the best way to transfer data. Examples: IP, Routers operate at this layer Data link – Provides transfer of units of information to other end of physical link. Handles physical addressing, network topology, error notification, delivery of frames, and flow control Examples: Bridges and switches operate at this layer Physical – Transmits bit stream on physical medium. Specifies the electrical, mechanical, procedural, and functional requirements for the physical link Communications & Network Security Physical Media Characteristics Fiber Optic – Refers to the medium and the technology associated with transmission of information as light impulses along a glass or plastic wire. Coaxial Cable – Used for Cable TV. Twisted Pair – Ordinary copper wire that connects home and business computers together. Two types are STP (Shielded twisted pair) and UTP (Unshielded twisted pair) Network Topologies – defines the manner in which the network devices are organized to facilitate communications. BUS Topology – All the transmissions of the network nodes travel the full length of cable and are received by all other stations. (Picture a straight line) RING Topology – The network nodes are connected by unidirectional transmission links to form a closed group. STAR Topology – The nodes of a network are connected to a central device directly, like a hub. TREE Topology – A BUS type topology where branches with multiple nodes are possible. MESH Topology – All nodes are connected to every other node to make the network redundant. IPSEC Authentication & Confidentiality Operates at the network layer and it enables multiple tunnels. IPSEC has the functionality to encrypt and authenticate IP data. It is built into IPv6. Works in two modes, Transport and Tunnel. TCP/IP Characteristics & Vulnerabilities - TBD LANs – a group of computers and associated devices that share a common communications line within a small geographical area. WANs – A geographically dispersed network that is usually made up of smaller LANs Remote Access/Telecommuting Techniques Tend to use Analog and ISDN lines along with the newer cable and DSL lines to connect to corporate networks. ISDN and Analog allow for the use of “callback” as an extra security measure. Secure Remote Procedure Call (S-RPC) - TBD RADIUS/TACAS Remote Access Dial In User System – A client/server protocol that enables RAS server to communicate with a central authentication authority. Allows the implementation of policies. Terminal Access Control Access System – An older protocol common to UNIX networks that was revamped by Cisco as TACACS+ using TCP. Network Monitors & Packet Sniffers - TBD Internet/Intranet/Extranet Firewalls Firewall Types: Packet Filtering – Examines both the source and destination addresses of the incoming data packet and applies ACL’s to them. Operates at either the Network or Transport layer. First generation. Application Level – Often called a Proxy Server. It works by transferring a copy of each accepted data packet from one network to another. Second generation. Stateful Inspection – Packets are captured by the inspection engine operating at the network layer and then analyzed at all layers. Third generation Dynamic Packet Filtering – Makes informed decisions on the ACL’s to apply. Fourth generation. Kernel Proxy – Very specialized architecture that provides modular kernelbased, multi-layer evaluation and runs in the NT executive space. Fifth generation. Firewall Architectures: Packet-filtering Routers Screened-Host Dual-homed host Screened-subnet (DMZ) Routers – Connected to at least two networks and make decisions on where to route traffic. Switches – Operates at layer 2 making decisions on where to send packets to their destination. Gateways – Acts as a point of entrance into a network. Proxies – Acts as an intermediary for internal hosts to access the Internet in order to ensure security. Protocols: TCP/IP – A 2 layer program with the higher level, TCP, manages the assembly of the message file into packets which are then transmitted over the lover layer, IP, which manages addresses. Network Layer Security IPSEC – A developing protocol that ensures confidentiality and integrity to IP packets using either ESP or AH to secure the packets. SKIP – (Simple Key Management for Internet Protocols). A technology that provides high availability in encrypted sessions. Similar to SSL, except that it requires no prior communication in order to establish keys. SWIPE - TBD Transport Layer Security (SSL) – Since replaced by TLS, SSL is the commonly used security protocol. It’s a socket layer security protocol and is two-layered protocol that contains the SSL record protocol and the SSL handshake protocol. Application Layer Security: S/MIME – A secure method of sending email that uses the Rivest-ShamirAdleman encryption system. SET – Originated by Visa and MasterCard. It supports the authentication of both the sender and the receiver and it ensures content privacy using digital certificates and signatures. PEM – Created by the IETF to act for email in a similar fashion as IPSEC does to IP. CHAP – An authentication mechanism where the server will send the client a key to be used to encrypt the username and password. This allows the logon credentials to be sent encrypted. PAP – An authentication mechanism where the username and password are sent in clear text to the server that then compares the password to the password table which is encrypted. PPP – A protocol for communicating between two computers using serial interfaces. It uses IP to transfer the traffic but operates at layer 2. SLIP – A protocol used to allow two machines to communicate that have been previously configured to do so. Services: HDLC – Derived from SDLC. It specifies the data encapsulation method on synchronous serial links using frame characters and checksums. It was created to support both point-to-point and multi-point configurations. Frame Relay – High performance WAN protocol that operates at the physical and data link layers. Designed for cost efficient data transmission. It uses a simplified framing approach and utilizes no error correction. It uses SVCs, PVCs, and DLCIs for addressing. SDLC – Created by IBM to make connecting to mainframes easier and is similar to layer 2. It uses a primary station to control all communications and one or more secondary stations. It’s based on leased lines with permanent physical connections. ISDN – Integrated Services Digital Network is a combination of digital telephony and data-transport services. It consists of digitization of the telephone network by permitting voice and other digital services to be transmitted over existing wires. Two types are BRI, basic rate, and PRI, primary rate. X.25 – The first packet-switching network. It defines point-to-point communication between DTE and DCE or DSU/CSU, which support both SVCs and PVCs. Communication Security Techniques: Tunneling – Using the Internet to “tunnel” data in a fashion similar to a private line. It often uses PPTP or the new L2TP. VPN – A private network that makes use of the public networks to ensure secure transmission of data using tunneling protocols. Network Monitors & Packet Sniffers – Tools to analyze and capture packets as they traverse a network. Network Address Translation – The translation of Internet IP addresses to RFC 1918 IP addresses often behind a firewall. Transparency – A condition within the OS or other services that allow the user access to a remote resource through a network without needing to know whether it is local or remote. NFS is a nice example. Hash Total – Producing hash values generated from a sting of text. Often generated using a formula that will make it difficult to create a similar hash value. Used for data integrity. Transmission Logging – TBD Transmission error correction – TBD Retransmission controls – TBD E-mail security Facsimile Security Secure Voice Communications Security boundaries and how to translate security policy to controls Network Attacks & Countermeasures ARP – A protocol for mapping IP addresses to physical machine addresses (MAC). RARP allows them to request an IP address from the MAC address. Brute Force – A trial and error method used by application programs to decode encrypted data. Worms – A self-replicating virus that does not alter files, but resides in memory and duplicates itself. Flooding – The forwarding by a router of a packet from a node to every other node on the network. Eavesdropping – TBD Sniffers – TBD Spamming – TBD PBX Fraud & Abuse – TBD