null
US
Entrar
Registre-se gratuitamente
Registre-se
Detectamos que o JavaScript não está habilitado no teu navegador. Habilite o Javascript para o funcionamento correto do nosso site. Por favor, leia os
Termos e Condições
para mais informações.
Próximo
Copiar e Editar
Você deve estar logado para concluir esta ação!
Inscreva-se gratuitamente
727512
U2.1 Cables, Hubs, Sniffers
Descrição
Nework Security Mapa Mental sobre U2.1 Cables, Hubs, Sniffers, criado por jjanesko em 07-04-2014.
Sem etiquetas
nework security
nework security
Mapa Mental por
jjanesko
, atualizado more than 1 year ago
Mais
Menos
Criado por
jjanesko
mais de 10 anos atrás
52
0
0
Resumo de Recurso
U2.1 Cables, Hubs, Sniffers
Protocol for Ethernet
CSMA/CD
Carrier Sense
before sending, device checks to see if there is another device using network, if yes, it waits
multiple access
any device can use network when it is free
collision detection
after detecting collision, wait a random delay
if collision detected again, wait 2x as long and check (called "expontential backoff")
cabling
thick ethernet
10BASE 5, 10 Mbps, 500m
thin ethernet
10BASE2, 10Mbps, 200m
unshielded twisted pair
10BASE-T, 100-BASE -T, T=twisted pair
Cat 1 telephone
Cat 3, 10Mbps
Cat 5, 100Mbps
Cat5e, 1000Mbps
shielded twisted pair
Used for token ring, good for high interference
fibre-optic
1000 Mbps or higher
wireless LAN
Not type of cabling, but often used instead of. 11-150Mbps
OSI layer 1
4 fundamental threats
information leakage
integrity violation
denial of service
illegitimate use
safeguards
run cable through protective trunking
lockable, dedicated network closets
add electromagnetic shielding to cabling
run cabling through trunking with pressurized gas, have alarms for pressure loss
hubs
types
dumb
intelligent
regenerate signals for long network cables
monitor congestion, send alarms
remote monitoring
switched network (see note)
Anexos:
U2.1 Cables, Hubs, Sniffers - Hub Diagram
network interface card (NIC)
listening modes
non-promiscuous
only listens to traffic targeted for that device
promiscuous
listens to all traffice on the network
Physical interface that allows a device to listen to network traffice
sniffer
device listening to all traffic on a network
detection
method 1
1.send large volume of packets to non-existing network address
2. send an ICMP request to suspect device. If device is sniffing, it will be overwhelmed.
method 2
1. Send packet to unused IP address on network
2. Sniff network to see if any devices try to resolve DNS name
examples
thin ethernet
coaxial cable
build network by daisychaining nodes
computers connect directly to network cable
vulnerabilities
when one cable is damaged, the whole network fails
all devices on network receive data
easy to attach addtional devices
10BASE-T
connects devices to network via hub (see note)
Anexos:
U2.1 Cables,Hubs,Sniffers- Thin Ethernet
vulnerabilities
all devices on network receive data (hub broadcasts)
easy to attach additional devices
Quer criar seus próprios
Mapas Mentais
gratuitos
com a GoConqr?
Saiba mais
.
Semelhante
U2.6 SNMPv3
jjanesko
U2.4 LANs, MANs, WANs
jjanesko
U2.5 SNMPv1
jjanesko
U2.1 Cables,Hubs,Sniffers- Thin Ethernet
jjanesko
U2.5 SNMPv1 - architectural model
jjanesko
U2.1 Cables, Hubs, Sniffers - Hub Diagram
jjanesko
U2.2 Switches, ARP - ARP spoofing steps
jjanesko
U2.3 TCP, Routers - Router Diagram
jjanesko
U2.5 SNMPv1 - SNMPv1 protocol stack
jjanesko
U2.2 Switches, ARP
jjanesko
U2.3 TCP, Routers, VLAN
jjanesko
Explore a Biblioteca