1. Trang chủ
  2. » Công Nghệ Thông Tin

security study guide phần 5 pot

11 196 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 11
Dung lượng 5,92 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Baseband signaling means that a single channel is carried through the coax, while broadband refers to multiple channels on the coax.. Ch1 Ch2 Ch3 Ch4 Ch5 Ch6 Time Single Wire or Channel

Trang 1

Coax supports both baseband and broadband signaling Baseband signaling means that a single channel is carried through the coax, while broadband refers to multiple channels on the coax Figure 3.20 illustrates this in detail Baseband signaling would be similar in concept to a speaker wire The speaker wire in your stereo connects one channel from the amplifier to the speaker Broadband is similar to the cable TV connection in your home The cable from the cable company carries hundreds of channels Each of these channels

is selected by your TV set, which uses a tuner to select which channel you choose to watch

F I G U R E 3 2 0 Baseband versus broadband signaling

Coax is present in many older networks and tends to provide reliable service once it is installed In a coax network, some type of device must terminate all of the ends of a coax Figure 3.21 shows this termination process in more detail If a terminator, NIC card, T-connector, or inline connector malfunctions or becomes disconnected, the entire segment of wire

in that network will malfunction and network services will cease operation Coax tends to become brittle over time, and it can fail when handled Coax

is also expensive per foot when compared to UTP cable These are the primary reasons that coax is falling from favor as a primary network media Coax has two primary vulnerabilities from a security perspective The most common would be the addition of a T-connector attached to a network

sniffer This sniffer would have unrestricted access to the signaling on the

cable The second and less common method involves a connection called

a vampire tap Vampire taps are a type of connection that directly attaches

Time

Broadband versus Baseband

Each channel is

a discrete frequency

or subband.

Ch1 Ch2 Ch3 Ch4 Ch5 Ch6

Time Single Wire or Channel

Data Slot

Data Slot

Data Slot

Data Slot

Data Slot Data Slot

Trang 2

to a coax by piercing the outer sheath and attaching a small wire to the center conductor or core This type of attachment allows a tap to occur almost anywhere in the network Taps can be hard to find because they can be any-where in the cable Figure 3.22 shows the two common methods of tapping

a coax cable Notice that the T-connector is a standard connector that can

be used at any place there is a connector on the cable Additionally, an inductive pickup or RF collar can be placed around a coaxial cable to capture any stray RF that does not get blocked by the shield of the coax

F I G U R E 3 2 1 Network termination in a coax network

F I G U R E 3 2 2 A vampire tap and a T-connector on a coax

Coax Cable

50 Ω Resistor Shield

Center Conductor

Terminator

Vampire Tap

BNC Connector

BNC Connector

The screw fang pierces the shielding and connects with the core.

T-Connector

Coax Coax

Trang 3

Unshielded Twisted Pair and Shielded Twisted Pair

Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP) are by far the

most prevalent media installed today UTP cabling and STP cabling are similar

in function with the exception that STP wraps a shield, like a coax, over the wires STP is popular, but UTP is by far the more popular cabling in use Fig-ure 3.23 illustrates the difference between UTP and STP cable Notice that the STP cable has a single shield around all of the pairs Some versions of STP also have shields around each pair of wires This is much less common in computer networks, but it reduces electrical and interference susceptibility in the cable

F I G U R E 3 2 3 UTP and STP cable construction

This discussion will revolve around UTP, but STP operates the same way UTP cabling comes in seven grades or categories, which are listed in Table 3.1

T A B L E 3 1 The Common UTP/STP Cable Specifications

Category 1 Voice-grade

cable

Used strictly for telephone and modems.

Category 2 4 Mbps speed Used extensively in older mainframe

systems.

Category 3 10 Mbps Ethernet Used in 10Base-T networks.

Category 4 16 Mbps Used extensively in Token Ring

networks.

shield

Trang 4

The most common cable standards used at this time are Category 5 or CAT 5 CAT 3 is very common in older twisted-pair networks The limit of a cable segment length of twisted-pair for use with Ethernet is 100 meters Beyond this length, the attenuation of the cables may cause reliability problems UTP and STP cabling is not as secure as coax, and it is used primarily for internal wiring It is more difficult to splice into a twisted pair cable, but three-way breakout boxes are very easy to build or buy The common net-works that use UTP are 10Base-T and 100Base-T These netnet-works use hubs for distribution, and hubs allow sniffers to be easily connected Many modern hubs also include the capability of switching, and network monitoring does not work properly through a switch Remember that each circuit through a switch is dedicated when switched and will not be seen on the other ports Figure 3.24 illustrates a hub in a 10Base-T network and a sniffer attached to the hub The sniffer in this situation is merely a portable PC with a NIC card for the network protocol

F I G U R E 3 2 4 10Base-T network with a sniffer attached at the hub

Category 5 1000 Mbps Used in 10-, 100-, and 1000Base-T and

similar networks The most common wiring in newer networks.

Category 6 1000 Mbps Used in high-speed network

installa-tions Not yet common.

Category 7 1 Gbps Used in very-high speed network

installa-tions Not available—proposed standard.

T A B L E 3 1 The Common UTP/STP Cable Specifications (continued)

10Base-T

Hub

PC with Sniffer Software

Trang 5

Fiber Optic

Fiber optic technology takes network bandwidth to new levels of perfor-mance Telecommunications and data communication providers worldwide have laid fiber cables extensively At one point, the industry claimed that fiber would surpass wire as the preferred method of making network connections Fiber optics and its assembly continue to be very expensive when compared

to wire, and this technology has still not largely made it to the desktop Figure 3.25 shows several of the more common fiber connections The con-struction of fiber cable is simplicity itself The cable consists of a glass or plastic conductor, surrounded by a protective coating or by layers of coating

F I G U R E 3 2 5 Commonly used fiber connectors

Fiber, as a media, is relatively secure because it cannot be easily tapped Fiber’s greatest security weakness is at the connections to the fiber optic transceivers Passive connections can be made at the connections, and signals can be tapped off from there The other common security issue associated with fiber optics is that fiber connections are usually bridged to wire connec-tions Figure 3.26 shows how a fiber connection to a transceiver can be tapped This type of splitter requires a signal regenerator for the split to function, and it can be easily detected

ST connectors

Trang 6

F I G U R E 3 2 6 An inline fiber splitter

Infrared

Infrared (IR) uses a type of radiation for communications This infrared radiation allows a point-to-point connection to be made between two IR transceiver-equipped devices IR is line of sight and is not secure, but the interception device must be either in position between the two connections

or in an area where a reflection has occurred IR can be bounced off win-dows and mirrors, as can other radiation IR connections also tend to be slow and are used for limited amounts of data Many newer laptop PCs, PDAs, and portable printers now come equipped with IR devices for wire-less communications

Radio Frequency

Radio frequency (RF) communication has had an interesting love/hate relationship with data communication Early data communication systems, such as teletypes, used extensive networks of high-powered shortwave transmitters to send information and data Most of the early news feeds were broadcast on shortwave frequencies and received around the world

by news offices These connections were also used for early facsimile trans-mission of weather maps and other graphically oriented images These transmitters were very expensive, and they required large numbers of per-sonnel to manage and maintain them Telephone connections largely replaced this means of communications, but teleprinters are still in use today

Fiber

Splits single fiber into two connections.

Fiber Splitter

Fiber Network

Fiber Connector

Trang 7

RF transmissions use antennas to send signals across the airwaves They are very easily intercepted Anyone could connect a shortwave receiver to the sound card of a PC to intercept and receive shortwave and higher frequency transmissions and record them Figure 3.27 illustrates a short-wave transmission between two ground sites used for text transmission This is a very active hobby with tens of thousands of hobbyists worldwide eavesdropping

F I G U R E 3 2 7 RF communications between two ground stations

Microwave

Microwaves use the RF spectrum, but they have some interesting character-istics and capabilities The microwave frequency spectrum is the home of many interesting types of communications Some of these communications involve huge amounts of data and information, and others involve very small

Bridge Device

Laser Printer

Server

Trang 8

amounts Some of the more common applications of microwave today include cellular phones, police and aircraft communications, fax, and broadband telecommunication systems The equipment to communicate on these fre-quencies is usually very small and power efficient

Much of the telecommunications system we use today is built on micro-wave technology Micromicro-wave has the ability to carry huge amounts of data, communicate line-of-sight, and use broad power ranges Figure 3.28 illustrates

a cell network in a metropolitan area A typical cell network is capable of handling hundreds of calls simultaneously, and cell usage is growing at a very fast rate worldwide

Communications on this cell network are easily intercepted by off-the-shelf equipment Analog cellular communications can be easily understood, while digital cellular service requires additional equipment to decode trans-missions Many people use cell phones for data communications Most people assume that cell connections are private when, in fact, they may not be

F I G U R E 3 2 8 Cellular network in a metropolitan area

A relative newcomer on the communications scene involves wireless networks Some of the wireless networks allow pagers, PDAs, and internal

Cell sites

Trang 9

or private networks Wireless networks operate in the 2.5 to 5.0GHz spec-trum The frequency spectrum used in cellular and wireless networks is in the microwave band

When implementing wireless networks, you would be wise to make sure that you implement or install communications security devices or encryption technology to prevent the unauthorized disclosure of information in your net-work Many of the newer devices include encryption protocols similar to IPSec

Removable Media

Computer systems have become modular over the last few years, and one of the benefits of this is removable media Disk drives that once cost thousands of dollars now cost hundreds or even less What once took up a whole room can easily be put in a coat pocket Removable media refers to any type of storage device (such as a floppy drive, magnetic tape cartridge,

or CD-ROM) that can be removed from the system Several of the more common removable media are covered in this section

The important thing to remember is that removable media is subject to viruses, physical damage, and theft If a CD-ROM is stepped on or scratched, it probably will not work properly If stolen, it will not be available and the information it contained will be gone forever

The following sections discuss the most common types of removable media in use today, and what physical and operational measures are needed

to safeguard your removable media

Tape

One of the oldest forms of removable media is magnetic tape Magnetic tapes

come in a variety of types and sizes Older tapes were reel-to-reel and were bulky and very sensitive to environmental factors such as heat and moisture Newer tapes are cartridge or cassette-oriented and are smaller and much more durable Some of the new tape technologies can store on a single tape what would have required a 10-foot-by-10-foot tape vault This single tape is slightly larger than a CD-ROM carrying case

Magnetic tapes have become very fast, and they can hold enormous amounts of data They are commonly used to back up systems and archive old data The major concern with tape involves physical security It is very easy to remove one from the premises undetected

Trang 10

Tape can be restored to another system, and all of the contents will be available for review and alteration It is relatively easy to edit a document, put it back on the tape, and then restore the bogus file back to the original computer system This of course, creates an integrity issue that may be difficult to detect

Tapes can also become infected with viruses, and they can infect a system during the data recovery process Files going onto a tape drive should be scanned to ensure that they are virus free

CD-R

The CD Recordable (CD-R) is a relatively new technology that allows CDs

to be made or burned on a computer system CD-Rs operate like a regular

CD, and they can be burned quickly Most new computer systems come standard with a CD-R “burner,” or CD-R drive Data can be backed up or restored from the CD-R very quickly CD-Rs are susceptible to computer viruses, and an infected file on the computer that is transferred to the CD-R will infect another system when the file is downloaded Data theft is also very easy with a CD-R An attacker can get on a system that has a CD-R and copy data from hard disks or servers Files written to a CD-R can contain viruses just like any other files This means that a CD can be a carrier All files should be scanned for viruses before they are written to or read from

a CD Some older CD-Rs are susceptible to erasure by sustained exposure to sunlight It is generally a good idea to keep CD-Rs out of environments that are high in ultraviolet (UV) light Most software products now come on

CD, and they can disappear quite easily This type of theft can cost a com-pany thousands of dollars

Hard Drives

Hard drives today are very small, and they can store a great deal of data

Usually, hard drives can be quickly removed from systems, and portable hard drives can be easily attached Software that creates an exact copy, or

image, of a drive can be used to download a system onto a hard drive in

min-utes Many of the hard drives available today use USB or parallel ports to connect, and some operating systems will install them automatically using Plug and Play technology An attacker can attach a USB hard drive and then copy files from a workstation This can happen in a matter of minutes with very little possibility of detection

Ngày đăng: 14/08/2014, 18:22