๐Ÿ“˜ Study Focus | Domain 4: Communication and Network Security

๐Ÿ“˜ Domain 4: Communication and Network Security

๐Ÿ”‘ Flashcard Topics (Protocol-Centric and Architecture-Heavy Content)


๐ŸŒ Network Models & Protocols

๐Ÿ“ถ OSI Model – Layer Functions

  • Mnemonic: All People Seem To Need Data Processing (7→1)
    7-Application, 6-Presentation, 5-Session, 4-Transport, 3-Network, 2-Data Link, 1-Physical.

๐Ÿงฉ Common Protocols by OSI Layer

  • Layer 7 (App): HTTP, FTP, DNS, SMTP

  • Layer 4 (Transport): TCP (reliable), UDP (fast)

  • Layer 3 (Network): IP, ICMP, IPsec

  • Layer 2 (Data Link): Ethernet, ARP, PPP

  • Layer 1 (Physical): Fiber, coax, electrical signals

๐Ÿ“Œ TCP vs UDP

  • TCP = reliable, connection-oriented, handshake (e.g., HTTPS).

  • UDP = fast, connectionless, no guarantees (e.g., VoIP, DNS).


๐Ÿ›ก️ Secure Protocols

๐Ÿ”’ IPSec (Layer 3)

  • Transport Mode = Encrypts payload only (used in end-to-end).

  • Tunnel Mode = Encrypts entire packet (used in VPNs/gateways).

  • ESP vs AH
    ESP = encrypts + authenticates; AH = authenticates only.

๐Ÿ” TLS/SSL (Layer 5–7)

  • Uses X.509 certificates for encryption and authentication.

  • Handshake = asymmetric key exchange → symmetric session key

๐Ÿ“ซ Email Security Protocols

  • S/MIME = encryption + digital signature (X.509)

  • PGP = web of trust model, similar purpose


๐Ÿ” Transmission Methods & Switching

๐Ÿ“ก Circuit Switching vs Packet Switching

  • Circuit = dedicated path (old phone lines)

  • Packet = data split into packets (Internet, VoIP)

๐Ÿ”ƒ Tunneling Protocols

  • GRE, PPTP, L2TP, IPSec
    Used to encapsulate traffic within other protocols.


๐Ÿ”— Network Devices

๐Ÿ“ฅ Firewalls

  • Packet-Filtering = L3/L4 rules, stateless

  • Stateful Inspection = tracks connection state

  • Proxy Firewall = inspects full packets (Layer 7)

  • Next-Gen Firewall (NGFW) = combines stateful + IDS/IPS

๐Ÿ“ก IDS vs IPS

  • IDS = Detects and alerts, passive

  • IPS = Detects and blocks, inline


๐Ÿ› ️ Security Concepts

๐Ÿ›ก️ Defense in Depth

  • Layered security across physical, technical, and administrative controls.

๐Ÿšซ Network Segmentation

  • Divides network into zones; limits lateral movement of attackers.

๐ŸŒ DMZ (Demilitarized Zone)

  • Hosts public-facing services while isolating internal network.


๐Ÿ•ณ️ Common Network Attacks

  • Spoofing = Pretend to be someone else (IP, ARP, DNS)

  • Sniffing = Capture unencrypted data (packet analyzers)

  • Replay Attack = Resend valid data to gain access

  • Man-in-the-Middle (MitM) = Intercept & alter data in transit

  • DDoS = Overwhelm with traffic from many sources


This domain is highly testable, but more fact-heavy than logic-heavy, making it perfect for flashcard drilling.


Comments

Popular posts from this blog

๐Ÿงญ CISSP Study Note: Guidelines

๐Ÿ’ธ CISSP Study Note: Risk Transference

๐Ÿ“ CISSP Study Note: Standards