Domain 4
Domain 4
CISSP Domain 4 –
Communication and Network
Security: A Guide
Copy Link
Domain 4 of the CISSP certification exam has had some changes you should be
aware of. This domain focuses on communication, network security, and security
information systems, which you must fully understand to be a cybersecurity
professional. It comprises 13% of the exam material you need to learn.
In the following guide, we have compiled the essential aspects you need to
know to pass Domain 4 of the CISSP exam and covered the 2021 update with
new information.
The CISSP exam contains technical elements, which especially apply to Domain
4, and is more technical than other domains. Networks allow organizations to
identify and realize revenue opportunities and communicate and interact with
clients. Therefore, networks are a valuable asset of any company and require
protection.
What is a network?
A network is at least two devices that are connected to each other. Like people,
in order to communicate, these devices must be able to speak a common
language (which is what a protocol does), and common rules of communication
must be followed.
What is a protocol?
The common rules of network communication are called protocols. A protocol is
simply a standard set of rules that are understood, conformed to, and abided by
so that two or more devices on a network can communicate.
Interhost
communication and Circuit Proxy
5 Session
session Firewall
management
End-to-end
connection with TCP/UDP, iSCSI
4 Transport 3 Transport
error correction and (SAN)
detection
Logical addressing, Routers, Packet
routing, and Filtering Firewalls,
3 Network delivery of IP addresses, ICMP, 2 Internet
datagrams NAT
OSI Description Devices & Protocols TCP/IP
Physical
Switches, bridges,
addressing, and
2 Data Link reliable point-to- MAC addresses, 1 Link
L2TP, PPTP
point connection
Binary transmission
of data across Hubs, NICs, Network
1 Physical
physical media media
(wire, fiber, etc.)
The higher the layer, the more functional the security features become, and
more comprehensive controls can be implemented; the lower the layer, the
opposite is true.
The actual implementation is through TCP/IP. The internet protocol suite (TCP/IP)
consists of many protocols—a family of protocols. TCP and IP, and the other
members of the protocol family run at different layers of the OSI model to
support the underlying tasks of a given layer.
For example, the Network layer is primarily responsible for taking information
and routing that, breaking it—fragmentation—into manageable chunks called
datagrams and providing addressing so those chunks can be communicated
across a network using a logical addressing scheme called IP addresses.
On the other hand, as information moves down from the Application layer to the
Physical layer, encapsulation is taking place. On the other side, when the fully
encapsulated information arrives, a process called decapsulation takes place.
Layer 1: Physical
Wired Wireless
Twisted pair cable refers to the fact that it is a pair of wires twisted together in a
specific way that creates a magnetic field, which allows the signal traveling
across the wire to remain within the magnetic field.
Coaxial cable is the cable often used by cable companies to bring television,
telephone, and high-speed internet access to homes.
Unlike twisted pair and coaxial cable, which use voltage for communication, fiber
optic utilizes light pulses to represent 0s and 1s. Both speed and security are
great advantages of using fiber optic. Among other things, twisted pair and
coaxial cable are both subject to what’s known as cross talk—interference—
because copper, by design, conducts electricity.
Cabling is one part of the equation; another part relates to topologies, or how
the cables are laid out. The most common network topology is known as a bus
topology, which simply means that all devices are connected to a central wire,
called a bus.
From a security point of view, a bus topology has several weaknesses. For one,
the bus represents a single point of failure. For another, all devices are
connected to a single wire, so by default, every device can intercept all the
information being transmitted across the wire.
A star topology, as the name suggests, resembles a star. All devices are
connected to a central device, like a switch or a hub. One significant
disadvantage of a star topology is that the central device represents a single
point of failure.
A mesh topology interconnects every device with every other device. This is
excellent for purposes of redundancy—if one device goes down, communication
with other devices is not impacted.
A ring topology looks like a ring. Devices are connected to a closed loop, and in
a sense, the loop is still essentially a bus, which can lead to issues like collisions.
Transmission methods
How these devices communicate is through transmission methods. From a
security perspective, unicast is the most secure method because communication
is limited to a specific destination device.
Layer 1 devices
Several important devices operate at Layer 1, among them:
Hubs
Repeaters
Concentrators
Layer 2—the Data Link layer—acts as a conduit between Layer 1—the Physical
layer—and Layer 3—the Network layer. The Physical layer only works with bits,
and the Network layer works with datagrams. Between them, the Data Link layer
takes datagrams from the Network layer and formats them in a manner that
allows the Physical layer to work with them as bits.
Physical addressing
Layer 2 is also the layer where devices that operate across a network are
physically and uniquely identified and separated from each other. For a network
to work, the devices on it need to have unique physical addresses. This unique
physical address exists and is known as a Media Access Control (MAC) address.
A MAC address is simply bits—0s and 1s—that uniquely identify and distinguish
every device on a network, and this unique identifier is specified via a device’s
network card.
Circuit-switched network
A great example of a circuit-switched network is the Public Switched Telephone
Network (PSTN), which has been in existence for many, many years. Connecting
across the PSTN requires another person’s telephone number, which can then
be dialed, and a series of devices that comprise the PSTN will establish the
circuit—the connection.
Transmission of digital data over analog connections
Data networks were built for speed and bandwidth, and it wasn’t long before
voice communications using data transmission were perfected. We know this as
Voice over IP, or VoIP or IP telephony, which encapsulates the internet protocol
to enable transmission of digital data over analog connections.
Packet-switched network
Packet-switched networks function by taking data that needs to be
communicated from one device to another and breaking it into datagrams or
packets. Each data packet contains information, such as addresses and
sequence numbers.
Layer 2 protocols
Layer 2 protocols are:
L2F
PPTP
L2TP
SLIP
ARP - IP to MAC
RARP - MAC to IP
The first three are tunneling protocols, which are required to create virtual
private networks (VPN).
Layer 2 devices
Significant devices that operate at Layer 2 are bridges and switches.
Authentication protocols
Layer 3 protocols
Layer 3 is home to several significant TCP/IP protocols. In addition to the already
discussed IP protocol, IGMP, IPsec, and routing protocols BGP, OSPF, and RIP
operate at Layer 3.
Layer 3 devices
The most obvious are routers, but Layer 3 switches can also be found at the
Network layer, along with packet-filtering firewalls.
Logical addressing
LAN technologies
These are the three common IEEE standards from the 802 family:
These are the private IPv4 IP address ranges that are not to be used on public
networks (like the internet).
From To
10.0.0.0 10.255.255.255
172.16.0.0 172.31.255.255
From To
192.168.0.0 192.168.255.255
Network classes
if networks were limited to only Class A, B, or C ranges, every network would
have only 254, 65,534, or 16+ million IP addresses for host devices, and these
limitations could create huge inefficiencies, potential security issues, significant
administrative overhead, and potential network-related performance and
congestion issues.
Layer 4: Transport
TCP and UDP are two transport protocols that reside at Layer 4.
both protocols are still heavily relied upon, and each serves a purpose. For
reliable, perhaps a bit slower, transmissions, TCP is a clear choice. However,
UDP is fast, and for things like video streaming, which requires speed, as well as
handling DNS requests, UDP is very efficient.
Ports
Ports equate to services, and services are small applications that provide
specific functionality. For example, for the common web service, HTTP, port 80 is
used by default.
If a service is not needed, especially ones that are dangerous, the associated
port should be closed, and techniques like packet filtering can be used to block
datagrams that reference the associated ports in the header.
Secure Real-time Transport Protocol (SRTP). This is the secure version of RTP,
which supports encryption, authentication, integrity, and replay attack
protection.
Session Initiation Protocol (SIP). It is responsible for initiating, maintaining,
and terminating voice and video sessions.
Vishing
Vishing is a form of phishing (voice phishing) that specifically takes place in the
context of VoIP environments. Smishing, on the other hand, relates to the
attacker sending SMS messages to the victim (SMS phishing).
In virtually all cases, any successful attack will sequentially go through the
phases outlined here:
1. Reconnaissance
2. Enumeration
3. Vulnerability analysis
4. Exploitation
SYN scanning
Tools like Nmap can easily perform SYN scanning, which consists of:
1. A client sends an SYN packet to a target machine’s specific port (e.g., TCP port 80) to try
and identify if it’s open or closed.
2. Possible responses are:
1. If the port is open, the target replies with an SYN-ACK packet, and then the
client responds with a final ACK packet, and the session is established.
2. If the port is closed, the target responds with an RST packet, and the session
is terminated.
SYN flooding
SYN flooding takes advantage of this fact when multiple SYN requests are sent
in rapid succession to a target machine, which responds with an SYN-ACK
packet, considering these valid connection requests. SYN floods are active
attacks because they impact the host by degrading its performance or bringing it
down altogether.
IP-based attacks
A number of IP-based attacks exist, like SYN flooding, eavesdropping,
overlapping fragment, and teardrop attacks.
Man-in-the-Middle
A man-in-the-middle attack manifests when the attacker inserts themselves in
the communication path of two entities and thus has an opportunity to intercept
and manipulate traffic between them.
Spoofing
Spoofing is pretending to be someone or something else, because that someone
or something usually possesses more privileges or has access to a resource. It is
not limited to one area of focus. Email, DNS entries, user IDs, IP and MAC
addresses, and even biometrics can be spoofed.
Ping
Traceroute
ICMP
DHCP
Ipconfig
WHOIS
Dig
Putty
Nmap
John the Ripper
Netstat
Nslookup
ARP poisoning
ARP poisoning involves a malicious user modifying their ARP table to direct
network traffic meant for another device to their device.
Access control
Authentication
Encryption
Integrity protection
CCMP or
Integrity None Michael MIC CCMP
GCMP
Wireless authentication
There are three main ways to authenticate to a wireless network:
Open authentication
Shared key
EAP is used
Wireless encryption
The main encryption technologies are:
IEEE 802.1Q is the standard that supports VLANs on networks, and typically, a
Layer 3 switch can be used to create VLANs based on needs and value.
WANs connect LANs through technologies such as dedicated leased lines, dial-
up phone lines, satellite and other wireless links, and data packet carrier
services.
X.25
Frame Relay
Asynchronous Transfer Mode (ATM)
Multi-Protocol Label Switching (MPLS)
Network architecture
Network architecture includes employing concepts such as defense in depth,
partitioning, a well-protected network perimeter, network segmentation, and
bastion hosts. Key elements of network architecture include the concepts
defined below:
Defense in depth
The concept of defense in depth refers to combining multiple layers of security
controls to protect a network.
Partitioning
Partitioning is the practice of controlling the flow of traffic between segments. . It
can be used to prevent traffic from those areas from being seen across the
entire network.
Network perimeter
The network perimeter is the last point that any organization can control. Like
physical security, where controls should comprise preventive, detective, and
corrective capabilities, the same should hold true for the network.
Limiting the ingress and egress point of a network to one creates a choke point
—a point where devices and technologies that enforce rules can be placed to
ensure all incoming and outgoing traffic is analyzed.
Bastion host
This risk can be mitigated through the creation of a subnetwork, usually referred
to as a Demilitarized Zone (DMZ), where services and applications that require
public access can be segregated.
Because the organization controls the DMZ, it can also provide necessary
protection for each application. In this context, devices and applications within a
DMZ are often referred to as bastion hosts and bastion applications.
Proxy
A proxy or proxy server is an intelligent application or hardware that acts as an
intermediary and is placed between clients and a server. They’re usually found at
Layer 7—the Application layer—of the OSI model.
NAT and PAT
NAT is the mechanism that allows us to translate private IP addresses to public
ones and vice versa. PAT is another mechanism that can be used, which helps us
perform port translation in the same notion as IP address translation is
performed.
Firewall technologies
A firewall is a concept that enforces security rules between two or more
networks by performing traffic filtering.
Firewall architectures
Packet filtering
A packet-filtering firewall architecture is the simplest one. The router, which
operates at Layer 3, can only make decisions based upon information that exists
at Layer 3—the header portion of the datagram, which contains information like
source IP, destination IP, service being requested, and so on.
Dual-homed host
A dual-homed host improves upon a packet-filtering router by replacing it with a
more intelligent computer or host that contains two network cards.
Screened host
By combining the architectural elements of a packet filtering and dual-homed
host firewall, the router can handle the first level of decision-making related to
incoming packets, and any packets that are allowed through can then be further
examined by the bastion host, which can be any type of firewall technology.
Screened subnet
Here, two firewalls are used, and between them, a subnet, such as a DMZ, can
be created. Traffic from the outside can be specifically directed to the DMZ and
thereby protect the internal network from potential attacks.
Three-legged firewall
A firewall by virtue of three connection points, although any number of
connection points could really exist.
Virus scanning
Stateful inspection
Content inspection
Mirror/span/promiscuous port
When a port on a network device (e.g., switch) is described as mirror, span, or
promiscuous, it’s meant that traffic passing through that device is copied to that
port, and any device connected to it, like an IDS, can obtain a copy of it for
inspection.
Ingress monitoring can help prevent malicious traffic from entering a network,
and egress monitoring can help prevent data loss, denial-of-service, and other
types of malicious activity from originating from the corporate environment.
Allow and deny lists are lists of IP addresses and specifically determine what
action may or may not be performed with respect to the IP addresses in a given
list.
Sandbox
A sandbox is a safe area where untrusted code can be isolated and run. Being
able to run potentially malicious software in a sandbox environment is one of the
corrective actions that an IDS/IPS can take.
Alert statuses
The next list illustrates the possible conditions of alerts that may be received by
security tools:
1. True-Positive: An attack is taking place, and the security tool raises an alert to denote that
fact.
2. True-Negative: No attack is present, and no alert is generated by a security tool. This
indicates the appropriate operation is in effect.
3. False-Positive: An alert is generated by the security tool; however, there’s no actual
attack taking place.
4. False-Negative: An attack is ongoing, but the security tool failed to raise an alert.
Endpoint security
Remote access
Implementing secure communication channels is an important component of
network security. In other words, putting protections in place to support network
connections—especially remote access—is critical.
Due to this fact, a method to protect traffic across that untrustworthy network
must be utilized, and the best method is usually a VPN solution.
Tunneling
VPN is tunneling plus encryption; without encryption, it can only be called a
tunnel. Tunneling is simply the process of taking a datagram and placing it inside
the data portion of another datagram. Some people also refer to this as
encapsulation.
This encapsulation process does not hide anything. It’s simply placing the
original datagram inside the data portion of another one.
Split tunneling
Split tunneling allows a user to access disparate resources—the internet and a
LAN, for example—at the same time, without all the traffic passing through the
VPN.
Running internet traffic directly from the user’s computer through the hotel
network can bypass organizational security controls, which can create significant
risk for the organization.
IPsec
IPsec works in one of two modes. Transport mode uses the header of the
original datagram, whereas, in tunnel mode, the header of the new datagram
encapsulates and encrypts the AH or ESP header and original IP header in the
data, or payload, portion of the new datagram.
In the context of IPsec, the key management protocol used is known as Internet
Key Exchange or IKE. IKE is essentially a version of Diffie–Hellman and is used
by IPsec to generate the same session key at each end of a VPN.
1. Client hello
2. Server hello
3. Creation and sharing of session key
4. Establishment of secure session
We have decades of experience and involvement with ISC2 to help you learn
everything you need to know to pass all domains of the CISSP exam, with a
personalized learning path and targeted recommendations for an optimal
learning style.
CISSP Company
CISSP Guidebook
CCSP
CCSP MasterClass
Flashcard App
Follow Us