Page 1588 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1588

Chapter 11: Secure Network Architecture and

               Securing Network Components




                1.  Application (7), Presentation (6), Session (5), Transport (4),
                    Network (3), Data Link (2), and Physical (1).


                2.  Problems with cabling and their countermeasures include
                    attenuation (use repeaters or don’t violate distance
                    recommendations), using the wrong CAT cable (check the cable
                    specifications against throughput requirements, and err on the side
                    of caution), crosstalk (use shielded cables, place cables in separate
                    conduits, or use cables of different twists per inch), cable breaks
                    (avoid running cables in locations where movement occurs),

                    interference (use cable shielding, use cables with higher twists per
                    inch, or switch to fiber-optic cables), and eavesdropping (maintain
                    physical security over all cable runs or switch to fiber-optic cables).

                3.  Some of the frequency spectrum-use technologies are spread
                    spectrum, Frequency Hopping Spread Spectrum (FHSS), Direct
                    Sequence Spread Spectrum (DSSS), and Orthogonal Frequency-
                    Division Multiplexing (OFDM).


                4.  Methods to secure 802.11 wireless networking include disabling
                    the SSID broadcast; changing the SSID to something unique;
                    enabling MAC filtering; considering the use of static IPs or using
                    DHCP with reservations; turning on the highest form of encryption
                    offered (such as WEP, WPA, or WPA2/802.11i); treating wireless
                    as remote access and employing 802.1X, RADIUS, or TACACS;
                    separating wireless access points from the LAN with firewalls;

                    monitoring all wireless client activity with an IDS; and considering
                    requiring wireless clients to connect with a VPN to gain LAN
                    access.

                5.  The LAN shared media access technologies are CSMA, CSMA/CA
                    (used by 802.11 and AppleTalk), CSMA/CD (used by Ethernet),
                    token passing (used by Token Ring and FDDI/CDDI), and polling
   1583   1584   1585   1586   1587   1588   1589   1590   1591   1592   1593