null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
727512
U2.1 Cables, Hubs, Sniffers
Descripción
Nework Security Mapa Mental sobre U2.1 Cables, Hubs, Sniffers, creado por jjanesko el 07/04/2014.
Sin etiquetas
nework security
nework security
Mapa Mental por
jjanesko
, actualizado hace más de 1 año
Más
Menos
Creado por
jjanesko
hace más de 10 años
52
0
0
Resumen del Recurso
U2.1 Cables, Hubs, Sniffers
Protocol for Ethernet
CSMA/CD
Carrier Sense
before sending, device checks to see if there is another device using network, if yes, it waits
multiple access
any device can use network when it is free
collision detection
after detecting collision, wait a random delay
if collision detected again, wait 2x as long and check (called "expontential backoff")
cabling
thick ethernet
10BASE 5, 10 Mbps, 500m
thin ethernet
10BASE2, 10Mbps, 200m
unshielded twisted pair
10BASE-T, 100-BASE -T, T=twisted pair
Cat 1 telephone
Cat 3, 10Mbps
Cat 5, 100Mbps
Cat5e, 1000Mbps
shielded twisted pair
Used for token ring, good for high interference
fibre-optic
1000 Mbps or higher
wireless LAN
Not type of cabling, but often used instead of. 11-150Mbps
OSI layer 1
4 fundamental threats
information leakage
integrity violation
denial of service
illegitimate use
safeguards
run cable through protective trunking
lockable, dedicated network closets
add electromagnetic shielding to cabling
run cabling through trunking with pressurized gas, have alarms for pressure loss
hubs
types
dumb
intelligent
regenerate signals for long network cables
monitor congestion, send alarms
remote monitoring
switched network (see note)
Adjunto:
U2.1 Cables, Hubs, Sniffers - Hub Diagram
network interface card (NIC)
listening modes
non-promiscuous
only listens to traffic targeted for that device
promiscuous
listens to all traffice on the network
Physical interface that allows a device to listen to network traffice
sniffer
device listening to all traffic on a network
detection
method 1
1.send large volume of packets to non-existing network address
2. send an ICMP request to suspect device. If device is sniffing, it will be overwhelmed.
method 2
1. Send packet to unused IP address on network
2. Sniff network to see if any devices try to resolve DNS name
examples
thin ethernet
coaxial cable
build network by daisychaining nodes
computers connect directly to network cable
vulnerabilities
when one cable is damaged, the whole network fails
all devices on network receive data
easy to attach addtional devices
10BASE-T
connects devices to network via hub (see note)
Adjunto:
U2.1 Cables,Hubs,Sniffers- Thin Ethernet
vulnerabilities
all devices on network receive data (hub broadcasts)
easy to attach additional devices
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
U2.6 SNMPv3
jjanesko
U2.4 LANs, MANs, WANs
jjanesko
U2.5 SNMPv1
jjanesko
U2.1 Cables,Hubs,Sniffers- Thin Ethernet
jjanesko
U2.5 SNMPv1 - architectural model
jjanesko
U2.1 Cables, Hubs, Sniffers - Hub Diagram
jjanesko
U2.2 Switches, ARP - ARP spoofing steps
jjanesko
U2.3 TCP, Routers - Router Diagram
jjanesko
U2.5 SNMPv1 - SNMPv1 protocol stack
jjanesko
U2.2 Switches, ARP
jjanesko
U2.3 TCP, Routers, VLAN
jjanesko
Explorar la Librería