- What is Data?
- Data is a Piece of information.
- Example:
- cisco : Data
- 1234 : Data
- Example:
- Data is a Piece of information.
- Types of Data?
- There are two types of data:
- Data in Motion
- When the information is moving from one location to another location.
- Data at Rest
- When the information is not moving from one location to another location.
- Data in Motion
- There are two types of data:
- How to secure Data at Rest?
- Physical security – put the pen drive / hard disk in locker.
- Logical security – put a password to pen drive.
- Here we learn one thing from CCNA to CCIE Security.
- How to secure Data in Motion?
- To secure DIM (Data in motion)
- We follow a model called CIA model.
- C – Confidentiality
- I – Integrity
- A – Availability
- How to secure Data in Motion?
- Confidentiality: Only authorized users can read the information.
- Integrity: Only authorized users can change the data.
- ( When the information is moving from one location to another location it should not be tampered or change )
- For that there is CRC ( Cyclic Redundancy Check ) in IP packet
- Availability: The information should be available to only authorized users.
- ( When a user login with his credentials, he should not be provided by other users data )
- Protecting the Infrastructure:
- NFP – Network Foundation Protection
- ( Idea of categorizing specific network functions and then implementing the correct security measures to build the best security for our networks )
- Broken the Basic network Infrastructure into four basic elements.
- NFP – Network Foundation Protection
- How many types of Traffic?
- There are three types of traffic:
- Host Type: Traffic that is destined to the device.
- Ex: If we telnet to the device then the traffic is called host traffic (TELNET, SSH, HTTP, HTTPS…etc.)
- Transit Type: The traffic that is going through the device.
- Ex: Any traffic forwarded by FIB ( Forward information base ) table
- CEF exception traffic Type: Where TTL is 1 or Less than 1 or non IP packets.
- Ex: ARP, BPDU…etc.
- Host Type: Traffic that is destined to the device.
- There are three types of traffic:
- Note: Cisco says that.
- You cannot implement security in traffic types.
- But we can only implement the security in traffic plane ( means Functionality )
- Rather than categorizing the traffic types it’s better to categorize the traffic based on functionality.
- How many types of traffic planes:
- Ans. There are four types of traffic planes:
- Management Plane: The traffic that is generated by the user to the device for the management perspective.
- Ex: TELNET, SSH, HTTP, HTTPS, SNMP, SYSLOG, CCP, etc.
- Data Plane: The traffic that is generated by the user for the user.
- Ex: PING, FTP…etc.
- Control Plane: The traffic that is generated by the device for the device.
- Ex: Routing Protocols Data.
- Service Plane: The traffic that going through the device but it requires special attention from the CPU.
- Ex: NAT on the router / VPN.
- If you want to perform NAT then the router want to inspect the transit data.
- Management Plane: The traffic that is generated by the user to the device for the management perspective.
- Ans. There are four types of traffic planes: