D386 Study Guide-2
D386 Study Guide-2
● LAMP
○ Components:
■ Linux - Operating system
■ Apache - Web server
■ MySQL - Relational database
■ PHP - Programming language
○ For hosting websites and web applications on a Linux
machine
○ All four components are open source
○ Backend stack
● WAMP
○ Components:
■ Windows - Operating system
■ Apache - Web server
■ MySQL - Relational database
■ PHP - Programming language
○ Only difference between LAMP is the OS (Linux vs.
Windows)
○ Backend stack
● MEAN
○ Components:
■ MongoDB - Document database
■ Express - Node.js web framework
■ Angular - Web application framework
■ Node.js - JavaScript web server
○ For building dynamic web apps
○ Open source end-to-end JavaScript stack
○ Largely used for cloud-hosted applications, very flexible
and scalable
○ Full stack
● MEVN
○ Components:
■ MongoDB - Document database
■ Express - Node.js web framework
■ Vue.js - Web app framework
■ Node.js - JavaScript web server
○ *MEVN is more similar to MEAN than MERN*
○ Full stack
● MERN
○ Components:
■ MongoDB - Document database
■ Express - Node.js web framework
■ React- Web application framework
■ Node.js - JavaScript web server
○ Full stack
○ Security Risks
■ Viruses - Type of malware designed to replicate itself. Running a program
can spread a virus. May or may not cause problems.
● VIDEO Viruses and worms
● COHORT Viruses (starting at 25:50)
● Types of viruses:
○ Armored - Complex code structures to prevent detection
○ Boot - Infects boot sectors of the hard drive. Turning on the
computer will trigger the virus to spread.
○ Trojans – Appears to be a legitimate program, but
performs malicious actions
■ Attacker usually uses social engineering to trick the
user into downloading or installing
■ Can spoof products by using the same icons and
names
○ Rootkits - Conceals malicious activities by altering system
functions to hide itself
■ Software that allows for stealthy presence of
unauthorized functionality in the system
■ Used when the attackers need to backdoor a
system and remain unnoticed access as long as
possible
○ Botnet - Networks of compromised devices controlled
remotely
■ VIDEO Distrubuted Denial of Service (DDOS)
■ Common uses: DDoS attacks, spam campaigns,
and click fraud
■ From the moment of infection, botnet agents keep
in touch with their remote Command-and-Control
server
○ Companion - Appears to be a legitimate file, similarly
named as a familiar executable, but executes malicious
code when opened
○ Macro Virus - Embedded in Microsoft Office files. Uses the
mini-basic programming language
○ Stealth - Any virus that attacks while trying to avoid
detection
○ Polymorphic virus - Constantly changes its code to create
new variants and avoid detection
○ Ransomware -Specified data or systems held captive by
attackers until a form of payment or ransom is provided
○ Worms - Malware that self-replicates without user action.
Uses the network as a transmission medium. Firewalls can
mitigate infestations.
● Vectors for infection - Spam emails, instant messaging, file-
sharing services, fake antivirus downloads, unpatched software,
infected hardware
■ Non-Virus attacks:
● Unauthorized access
● Privilege escalation
● Insider threats
● Phishing - Trick users into providing sensitive information
● Code and SQL Injection - Inserted into applications or queries to
gain unauthorized access
● Man in the MIddle - Intercept of communication to eavesdrop,
manipulate, or impersonate.
★ Networking
○ COHORT Networking
○ Networking Hardware:
■ VIDEO Routers, switches, access points
■ Network Interface Card (NIC) - hardware component, typically a circuit
board or chip, installed on a computer so it can connect to a network
■ Hub - The dumb versions of switches
● Message is broadcast to every port on the hub
● Considered obsolete due to inefficiency
■ Switch - Connects multiple devices together and forwards data packets
to/from those devices
● Only sends data to the device it is intended for
● Contains memory and knows which node is on which port
■ Modem - Processes signal from internet service provider and interfaces
with local network
■ Router - Creates local network, routes service to devices
■ Access Point - Allows devices to connect to a network wirelessly, often
combined with a router
■ Bridge / Gateway – Connects multiple sub-networks to create a single,
larger network
■ Firewall - Monitors traffic to or from your network. It allows or blocks traffic
based on a defined set of security rules.
■ Patch panel – mounted hardware assembly that contains ports used to
connect and manage incoming/outgoing LAN cables. Enables flexible
physical connectivity into a network and keeps cables organized.
■ CAT Cables:
● Made of unshielded twisted pair (UTP) wire
● Speeds:
○ Networking Architectures:
■ Client-server model – Centralized network where one or more devices, or
servers, provide services and resources to other devices, or clients.
● Clients request and receive data from servers which handle
processing and storage
● More reliable, secure, and efficient than P2P
● High cost, complex, and require maintenance
● Require specialized hardware and software and depend on the
functionality and available of the servers
● Suitable for large-scale, permanent, or formal applications, such
as web hosting, email, or database management
■ Peer-to-peer (P2P) - Each machine on the network can act as both server
and client (like Bitcoin and Tor)
● Easy to setup – minimal hardware and software requirements
● Users control their own data and resources
● Limited performance, reliability, and security
● Suitable for small-scale, temporary, or informal applications
(gaming, file sharing, and messaging)
■ Web server – software and hardware that uses HTTP and other protocols
to respond to client requests made of the web
● Web server providers: Apache, Nginx, LiteSpeed, Microsoft-IIS
○ Network Topologies:
■ VIDEO Network topology Network topologies
■ Bus - A single line of devices connected together by one shared network
cable, outdated
● Computers connect to the network by physically tapping into the
network cable
● Devices cannot send and receive simultaneously due to collision
along single line of communication
● Not secure or private, all computers attached to the network will
receive any and all traffic sent on the network
● Inexpensive, easy to install, and difficult to reconfigure
● Failure on the network cable means complete network failure
■ Star (hub-and-spoke) - Composed of a central network device connected
to various network devices by individual network cables
● All communication is sent through a central access point
● Most common type of network found in LANs
● Versatile. Cables can be run through a building, making moving
and hooking up equipment easier
● Break in comm line only affects a single device
● Failure of switch means complete network failure
■ Ring - Connects devices with exactly two neighboring devices
● Doesn’t have to actually look like a ring.
● Data flows in one direction (can be made bidirectional by having 2
connections between each node called a 2 ring topology)
● Reduces collision since everything travels in one direction
● Cheap to install and expand
● Pass tokens. A token is a frame of data transmitted between
network points.
● Break in the connection means complete network failure
■ Mesh - Connects every device to every other device
● Very high fault tolerance
● Not reasonable at high numbers
● Expensive to add new nodes
● Can establish new connections around failed nodes as needed
● Usually Wi-Fi with multiple routers
■ Tree – a variation of the star topology with a hierarchical flow of data
● Multi-point connection and a non-robust topology because if the
backbone fails the topology crashes
● Allows the network to get isolated and prioritize from different
computers
● Error detection and correction are easy
● High installation cost (due to cabling)
● Adding devices can make reconfiguration difficult
■ Point to Point - One point connecting to another point
○ Area Network Types:
■ VIDEO Network types
■ Personal Area Network (PAN) - Centered around a person and their
devices
● Like Bluetooth
■ Local Area Network (LAN) – Connected in a limited area, like home or
office
● Most often Ethernet, Wi-Fi, or both (it can be wired or wireless)
■ Campus Area Network (CAN) - Multiple LANs across a limited area
● Like a university campus or a group of buildings owned by a
company.
■ Metropolitan Area Network (MAN) – Covers a whole city or the equivalent
of a metropolitan area
● Made up of multiple LANs owned by many entities
■ Wide Area Network (WAN) - Covers a large geographical area (like the
internet)
● Mate up of two or more LANs, geographically remote
■ Wireless Local Area Network (WLAN) – same as LAN but wireless
● Wi-Fi
■ Storage Area Network (SAN) - network that allows access to storage
devices specifically
● Allow servers to access devices such as disk arrays
● Presented to OS like any other storage device
○ Protocols
■ VIDEO TCP vs UDP
■ Hypertext Transfer Protocol (HTTP) - Runs on top of other layers of the
network protocol stack. Used to load web pages using hypertext links
■ Transmission Control Protocol (TCP) - Ensures successful delivery of
data and messages
■ Internet Protocol (IP) – Network interface identification and location
addressing
■ Dynamic Host Configuration Protocol (DHCP) - Dynamically and
automatically assigns an IP address to any device, or node, on a network
so it can communicate using IP. Limited to a specific LAN.
■ Syslog Protocol - Send event data logs to a central location for storage.
Logs can be accessed by analysis and reporting software to perform
audits, monitoring, troubleshooting, and other essential IT operational
tasks.
■ Address Resolution Protocol (ARP) - Translates IP addresses to media
access control (MAC) addresses and vice versa.
○ Network Ports
■ VIDEO Network ports
■ VIDEO Common network ports
■ Port - Logical connection. Determines which program or service on a
computer or server is going to be used.
● Identified by a unique number 0-65535
● Always associated with an IP Address to identify the device where
the port is
○ IPv4 - Four sets of numbers ranging 0-255, separated by
periods
○ IPv6 - Eight sets of four hexadecimal digits, separated by
colons
● Common port numbers
○ System or Well-known ports 0-1023
■ FTP (File Transfer Protocol)
● tcp/20 Data, tcp/21 Control
■ SSH (Secure Shell)
● tcp/22 Encrypted
■ Telnet (Telecommunications network)
● tcp/23 Non encrypted
■ SMPT (Simple Mail Transfer Protocol)
● tcp/25 Send email
■ DNS (Domain Name System)
● udp/53 Converts names to IP addresses
■ DHCP (Dynamic Host Configuration Protocol)
● udp/67, udp/68 Automated configuration of
leased IP addresses
■ HTTP (Hypertext Transfer Protocol)
● tcp/80 Web server
● tcp/443 Web server with encryption
■ POP3 (Post Office Protocol version 3)
● tcp/110 Basic email reception
■ IMAP4 (Internet Message Access Protocol)
● tcp/143 Mailbox management and email
reception
■ SMB (Server Message Block)
● udp/137 NetBIOS find devices by name, old
● udp/139 NetBIOS set up session for transfer
● tcp/445 Direct connection between devices
■ SNMP (Simple Network Management Protocol)
● udp/161 Network queries
● udp/162 Network alerts or traps
■ LDAP (Lightweight Directory Access Protocol)
● tcp/389 Query Microsoft Active Directory
■ RDP (Remote Desktop Protocol)
● tcp/389 Windows remote sharing
■ Syslog Protocol
● udp/514 System logs
● tcp/1468 System logs with confirmed
delivery
○ User or Registered ports 1024-49151
■ Can be registered by companies and developers
for a price
■ Examples: 1102 Adobe, 1416 Novell, 1433
Microsoft SQL Server, 1537 Oracle
○ Dynamic or Private ports 49152-65535
■ Client computer assigns temporarily to itself
○ Networking Models:
■ OSI
● VIDEO OSI model
● 1. Physical Layer
○ Transmission of data
○ Physical Cabling, Network Interface Card
○ Electrical signals
● 2. Data Link Layer
○ Physical addressing, LAN delivery
○ L2 switches, Bridges
○ MAC address, switch
○ Ethernet
● 3. Network Layer
○ Routing data, logical addressing, WAN delivery
○ Fragments packets
○ L3 switches, Routers
○ IP address, router, packet
● 4. Transport Layer
○ End-to-end communication maintenance
○ Assembles packets
○ TCP segment, UDP datagram
● 5. Session Layer
○ Communication management between devices
○ SQL, RPC, NFS
○ Control protocols, tunneling protocols
● 6. Presentation Layer
○ Data format, encryption
○ JPG, MPG, PNG
○ Application encryption
○ Secure socket layer (SSL), transport layer security (TLS)
● 7. Application Layer
○ User interface, what we see
○ FTP, HTTP, IMAP, SMTP
○ Network Security:
■ Intrusion Detection System (IDS) – Monitors the network to detect threats
● Passive listening
● Works well in tap mode, connected to network to view traffic
● Sends an alert to the administrator about suspicious behavior
■ Intrusion Prevention System (IPS) – intercepts and blocks threats (acts)
● Must be positioned in in-line mode, actively block malicious traffic
● Nodes use routed cables connected to IPS device to create a
choke point
● Invisible on the network
■ Unified Threat Management (UTM) – a combination of IDS, IPS, next-gen
firewall (NGFW), antivirus, VPN, web-filtering, data loss prevention, and
anti-malware in a single device or service
● Essentially does all the things
■ AAA Network Security: (Authentication, Authorization, and Accounting)
● Authentication - the process of confirming a person’s identity
○ Username and password
○ 2-factor authentication
○ Using a 3rd party ACS (access control system) server
○ Biometrics (fingerprint scans, Face ID, retina scans)
● Authorization - determine what resources the user can access and
the operations that can be performed
● Accounting - monitoring and capturing the events done by the
user while accessing the network resources (it’s just auditing)
★ Quizzes
○ Quizlet 0
○ Quizlet 1
○ Quizlet 2
○ Quizlet 3
○ Quizlet 4
○ Quizlet 5
○ Quizzets