Discussion/Fun
Network Modeling Basics Recall
  - Network Modeling - OSI Model (Open Systems Interconnection)
- Layers of Cybersecurity
- MAC/MIC
- Latency [s]
- Bandwidth [bps]
ISO/OSI Model
  - Router/L3 Switch, Switch, Hub/Repeater
- Physical Layer - Physical Channel
    
      - Channel Capacity
        
      
- Confidentiality vs. openness
 
- Segmentation
    
  
- Reliability - encoding, modulation
- Availability (+ regulations: ISM Bands)
BIE-UKB Lecture 06 Notes: Network Security
Attacks and Measures
(Availability) Attack Zoo
  - Ping of Death
- Ping Flood
- Smurf Attack
- SYN Flood
- DoS, DDoS, Amp. DDoS
Network Segmentation
Models
Perimeter Model
  - Phishing - time-limited code (2FA) is hard to exploit
- weakest path is the attack path - attack cost
Zero Trust
  - Network is only one component - defense in depth
- from implicit rights to explicit rights
Network Monitoring
Packet Capture
  - Deep Packet inspection
    
      - Past -> Network Forensics Devices
        
          - Big data -> Big-Data Analysis !!!
- Encryption …
 
- 
        Now -> On-the-Fly 
- Gateway SSL Inspection
        
          - man-in-the-middle-like SSL inspection
- Privacy/Legal Problems
 
 
Netflows
  - metadata about the connection
- Statistics: typical net flow
Logs
  - Information aggregation
    
      - SIEM - Security Information Management
- SEM - Security Event Management