text
stringlengths 2
104M
| meta
dict |
---|---|
<% if (post.link){ %>
<h1 itemprop="name">
<a class="<%= class_name %>" href="<%- url_for(post.link) %>" target="_blank" itemprop="url"><%= post.title %></a>
</h1>
<% } else if (post.title){ %>
<% if (index){ %>
<h1 itemprop="name">
<a class="<%= class_name %>" href="<%- url_for(post.path) %>"><%= post.title %></a>
</h1>
<% } else { %>
<h1 class="<%= class_name %>" itemprop="name">
<%= post.title %>
</h1>
<% } %>
<% } %> | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
<% if (post.prev || post.next){ %>
<nav id="article-nav">
<% if (post.prev){ %>
<a href="<%- url_for(post.prev.path) %>" id="article-nav-newer" class="article-nav-link-wrap">
<strong class="article-nav-caption"><%= __('newer') %></strong>
<div class="article-nav-title">
<% if (post.prev.title){ %>
<%= post.prev.title %>
<% } else { %>
(no title)
<% } %>
</div>
</a>
<% } %>
<% if (post.next){ %>
<a href="<%- url_for(post.next.path) %>" id="article-nav-older" class="article-nav-link-wrap">
<strong class="article-nav-caption"><%= __('older') %></strong>
<div class="article-nav-title"><%= post.next.title %></div>
</a>
<% } %>
</nav>
<% } %> | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
<% if (site.tags.length){ %>
<div class="widget-wrap">
<h3 class="widget-title"><%= __('tags') %></h3>
<div class="widget">
<%- list_tags({show_count: theme.show_count}) %>
</div>
</div>
<% } %>
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
<% if (site.tags.length){ %>
<div class="widget-wrap">
<h3 class="widget-title"><%= __('tagcloud') %></h3>
<div class="widget tagcloud">
<%- tagcloud() %>
</div>
</div>
<% } %> | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
<% if (site.categories.length){ %>
<div class="widget-wrap">
<h3 class="widget-title"><%= __('categories') %></h3>
<div class="widget">
<%- list_categories({show_count: theme.show_count}) %>
</div>
</div>
<% } %>
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
<% if (site.posts.length){ %>
<div class="widget-wrap">
<h3 class="widget-title"><%= __('archive_a') %></h3>
<div class="widget">
<%- list_archives({show_count: theme.show_count, type: theme.archive_type}) %>
</div>
</div>
<% } %>
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
<% if (site.posts.length){ %>
<div class="widget-wrap">
<h3 class="widget-title"><%= __('recent_posts') %></h3>
<div class="widget">
<ul>
<% site.posts.sort('date', -1).limit(5).each(function(post){ %>
<li>
<a href="<%- url_for(post.path) %>"><%= post.title || '(no title)' %></a>
</li>
<% }) %>
</ul>
</div>
</div>
<% } %> | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
categories: 分類
search: 搜尋
tags: 標籤
tagcloud: 標籤雲
tweets: 推文
prev: 上一頁
next: 下一頁
comment: 留言
archive_a: 彙整
archive_b: 彙整:%s
page: 第 %d 頁
recent_posts: 最新文章
newer: Newer
older: Older
share: Share
powered_by: Powered by
rss_feed: RSS Feed
category: Category
tag: Tag | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
categories: Categories
search: Search
tags: Tags
tagcloud: Tag Cloud
tweets: Tweets
prev: Prev
next: Next
comment: Comments
archive_a: Archives
archive_b: "Archives: %s"
page: Page %d
recent_posts: Recent Posts
newer: Newer
older: Older
share: Share
powered_by: Powered by
rss_feed: RSS Feed
category: Category
tag: Tag | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
categories: Categorieën
search: Zoeken
tags: Labels
tagcloud: Tag Cloud
tweets: Tweets
prev: Vorige
next: Volgende
comment: Commentaren
archive_a: Archieven
archive_b: "Archieven: %s"
page: Pagina %d
recent_posts: Recente berichten
newer: Nieuwer
older: Ouder
share: Delen
powered_by: Powered by
rss_feed: RSS Feed
category: Categorie
tag: Label
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
categories: Catégories
search: Rechercher
tags: Mot-clés
tagcloud: Nuage de mot-clés
tweets: Tweets
prev: Précédent
next: Suivant
comment: Commentaires
archive_a: Archives
archive_b: "Archives: %s"
page: Page %d
recent_posts: Articles récents
newer: Récent
older: Ancien
share: Partager
powered_by: Propulsé by
rss_feed: Flux RSS
category: Catégorie
tag: Mot-clé
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
categories: Категории
search: Поиск
tags: Метки
tagcloud: Облако меток
tweets: Твиты
prev: Назад
next: Вперед
comment: Комментарии
archive_a: Архив
archive_b: "Архив: %s"
page: Страница %d
recent_posts: Недавние записи
newer: Следующий
older: Предыдущий
share: Поделиться
powered_by: Создано с помощью
rss_feed: RSS-каналы
category: Категория
tag: Метка | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
categories: 分类
search: 搜索
tags: 标签
tagcloud: 标签云
tweets: 推文
prev: 上一页
next: 下一页
comment: 留言
archive_a: 归档
archive_b: 归档:%s
page: 第 %d 页
recent_posts: 最新文章
newer: Newer
older: Older
share: Share
powered_by: Powered by
rss_feed: RSS Feed
category: Category
tag: Tag | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
categories: Kategorier
search: Søk
tags: Tags
tagcloud: Tag Cloud
tweets: Tweets
prev: Forrige
next: Neste
comment: Kommentarer
archive_a: Arkiv
archive_b: "Arkiv: %s"
page: Side %d
recent_posts: Siste innlegg
newer: Newer
older: Older
share: Share
powered_by: Powered by
rss_feed: RSS Feed
category: Category
tag: Tag | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
// Config
support-for-ie = false
vendor-prefixes = webkit moz ms official
// Colors
color-default = #555
color-grey = #999
color-border = #ddd
color-link = #258fb8
color-background = #eee
color-sidebar-text = #777
color-widget-background = #ddd
color-widget-border = #ccc
color-footer-background = #262a30
color-mobile-nav-background = #191919
color-twitter = #00aced
color-facebook = #3b5998
color-pinterest = #cb2027
color-google = #dd4b39
// Fonts
font-sans = "Helvetica Neue", Helvetica, Arial, sans-serif
font-serif = Georgia, "Times New Roman", serif
font-mono = "Source Code Pro", Consolas, Monaco, Menlo, Consolas, monospace
font-icon = FontAwesome
font-icon-path = "fonts/fontawesome-webfont"
font-icon-version = "4.0.3"
font-size = 14px
line-height = 1.6em
line-height-title = 1.1em
// Header
logo-size = 40px
subtitle-size = 16px
banner-height = 300px
banner-url = "images/banner.png"
sidebar = hexo-config("sidebar")
// Layout
block-margin = 50px
article-padding = 20px
mobile-nav-width = 280px
main-column = 9
sidebar-column = 3
if sidebar and sidebar isnt bottom
_sidebar-column = sidebar-column
else
_sidebar-column = 0
// Grids
column-width = 80px
gutter-width = 20px
columns = main-column + _sidebar-column
// Media queries
mq-mobile = "screen and (max-width: 479px)"
mq-tablet = "screen and (min-width: 480px) and (max-width: 767px)"
mq-normal = "screen and (min-width: 768px)"
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
$block-caption
text-decoration: none
text-transform: uppercase
letter-spacing: 2px
color: color-grey
margin-bottom: 1em
margin-left: 5px
line-height: 1em
text-shadow: 0 1px #fff
font-weight: bold
$block
background: #fff
box-shadow: 1px 2px 3px #ddd
border: 1px solid color-border
border-radius: 3px
$base-style
h1
font-size: 2em
h2
font-size: 1.5em
h3
font-size: 1.3em
h4
font-size: 1.2em
h5
font-size: 1em
h6
font-size: 1em
color: color-grey
hr
border: 1px dashed color-border
strong
font-weight: bold
em, cite
font-style: italic
sup, sub
font-size: 0.75em
line-height: 0
position: relative
vertical-align: baseline
sup
top: -0.5em
sub
bottom: -0.2em
small
font-size: 0.85em
acronym, abbr
border-bottom: 1px dotted
ul, ol, dl
margin: 0 20px
line-height: line-height
ul, ol
ul, ol
margin-top: 0
margin-bottom: 0
ul
list-style: disc
ol
list-style: decimal
dt
font-weight: bold | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
@import "nib"
@import "_variables"
@import "_util/mixin"
@import "_util/grid"
global-reset()
input, button
margin: 0
padding: 0
&::-moz-focus-inner
border: 0
padding: 0
@font-face
font-family: FontAwesome
font-style: normal
font-weight: normal
src: url(font-icon-path + ".eot?v=#" + font-icon-version)
src: url(font-icon-path + ".eot?#iefix&v=#" + font-icon-version) format("embedded-opentype"),
url(font-icon-path + ".woff?v=#" + font-icon-version) format("woff"),
url(font-icon-path + ".ttf?v=#" + font-icon-version) format("truetype"),
url(font-icon-path + ".svg#fontawesomeregular?v=#" + font-icon-version) format("svg")
html, body, #container
height: 100%
body
background: color-background
font: font-size font-sans
-webkit-text-size-adjust: 100%
.outer
clearfix()
max-width: (column-width + gutter-width) * columns + gutter-width
margin: 0 auto
padding: 0 gutter-width
.inner
column(columns)
.left, .alignleft
float: left
.right, .alignright
float: right
.clear
clear: both
#container
position: relative
.mobile-nav-on
overflow: hidden
#wrap
height: 100%
width: 100%
position: absolute
top: 0
left: 0
transition: 0.2s ease-out
z-index: 1
background: color-background
.mobile-nav-on &
left: mobile-nav-width
if sidebar and sidebar isnt bottom
#main
@media mq-normal
column(main-column)
if sidebar is left
@media mq-normal
#main
float: right
@import "_extend"
@import "_partial/header"
@import "_partial/article"
@import "_partial/comment"
@import "_partial/archive"
@import "_partial/footer"
@import "_partial/highlight"
@import "_partial/mobile"
if sidebar
@import "_partial/sidebar" | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
#footer
background: color-footer-background
padding: 50px 0
border-top: 1px solid color-border
color: color-grey
a
color: color-link
text-decoration: none
&:hover
text-decoration: underline
#footer-info
line-height: line-height
font-size: 0.85em | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
.widget-wrap
margin-bottom: block-margin !important
@media mq-normal
column(main-column)
.widget-title
color: #ccc
text-transform: uppercase
letter-spacing: 2px
margin-bottom: .5em
line-height: 1em
font-weight: bold
.widget
color: color-grey
ul, ol
li
display: inline-block
zoom:1
*display:inline
padding-right: .75em
/* Having problems getting balanced white space between items
li:before
content: " | "
li:first-child:before
content: none
*/
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
#comments
background: #fff
box-shadow: 1px 2px 3px #ddd
padding: article-padding
border: 1px solid color-border
border-radius: 3px
margin: block-margin 0
a
color: color-link | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
if sidebar is bottom
@import "sidebar-bottom"
else
@import "sidebar-aside"
.widget
@extend $base-style
line-height: line-height
word-wrap: break-word
font-size: 0.9em
ul, ol
list-style: none
margin: 0
ul, ol
margin: 0 20px
ul
list-style: disc
ol
list-style: decimal
.category-list-count
.tag-list-count
.archive-list-count
padding-left: 5px
color: color-grey
font-size: 0.85em
&:before
content: "("
&:after
content: ")"
.tagcloud
a
margin-right: 5px
display: inline-block
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
.archives-wrap
margin: block-margin 0
.archives
clearfix()
.archive-year-wrap
margin-bottom: 1em
.archive-year
@extend $block-caption
.archives
column-gap: 10px
@media mq-tablet
column-count: 2
@media mq-normal
column-count: 3
.archive-article
avoid-column-break()
.archive-article-inner
@extend $block
padding: 10px
margin-bottom: 15px
.archive-article-title
text-decoration: none
font-weight: bold
color: color-default
transition: color 0.2s
line-height: line-height
&:hover
color: color-link
.archive-article-footer
margin-top: 1em
.archive-article-date
color: color-grey
text-decoration: none
font-size: 0.85em
line-height: 1em
margin-bottom: 0.5em
display: block
#page-nav
clearfix()
margin: block-margin auto
background: #fff
box-shadow: 1px 2px 3px #ddd
border: 1px solid color-border
border-radius: 3px
text-align: center
color: color-grey
overflow: hidden
a, span
padding: 10px 20px
line-height: 1
height: 2ex
a
color: color-grey
text-decoration: none
&:hover
background: color-grey
color: #fff
.prev
float: left
.next
float: right
.page-number
display: inline-block
@media mq-mobile
display: none
.current
color: color-default
font-weight: bold
.space
color: color-border | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
#header
height: banner-height
position: relative
border-bottom: 1px solid color-border
&:before, &:after
content: ""
position: absolute
left: 0
right: 0
height: 40px
&:before
top: 0
background: linear-gradient(rgba(0, 0, 0, 0.2), transparent)
&:after
bottom: 0
background: linear-gradient(transparent, rgba(0, 0, 0, 0.2))
#header-outer
height: 100%
position: relative
#header-inner
position: relative
overflow: hidden
#banner
position: absolute
top: 0
left: 0
width: 100%
height: 100%
background: url(banner-url) center #000
background-size: cover
z-index: -1
#header-title
text-align: center
height: logo-size
position: absolute
top: 50%
left: 0
margin-top: logo-size * -0.5
$logo-text
text-decoration: none
color: #fff
font-weight: 300
text-shadow: 0 1px 4px rgba(0, 0, 0, 0.3)
#logo
@extend $logo-text
font-size: logo-size
line-height: logo-size
letter-spacing: 2px
#subtitle
@extend $logo-text
font-size: subtitle-size
line-height: subtitle-size
letter-spacing: 1px
#subtitle-wrap
margin-top: subtitle-size
#main-nav
float: left
margin-left: -15px
$nav-link
float: left
color: #fff
opacity: 0.6
text-decoration: none
text-shadow: 0 1px rgba(0, 0, 0, 0.2)
transition: opacity 0.2s
display: block
padding: 20px 15px
&:hover
opacity: 1
.nav-icon
@extend $nav-link
font-family: font-icon
text-align: center
font-size: font-size
width: font-size
height: font-size
padding: 20px 15px
position: relative
cursor: pointer
.main-nav-link
@extend $nav-link
font-weight: 300
letter-spacing: 1px
@media mq-mobile
display: none
#main-nav-toggle
display: none
&:before
content: "\f0c9"
@media mq-mobile
display: block
#sub-nav
float: right
margin-right: -15px
#nav-rss-link
&:before
content: "\f09e"
#nav-search-btn
&:before
content: "\f002"
#search-form-wrap
position: absolute
top: 15px
width: 150px
height: 30px
right: -150px
opacity: 0
transition: 0.2s ease-out
&.on
opacity: 1
right: 0
@media mq-mobile
width: 100%
right: -100%
.search-form
position: absolute
top: 0
left: 0
right: 0
background: #fff
padding: 5px 15px
border-radius: 15px
box-shadow: 0 0 10px rgba(0, 0, 0, 0.3)
.search-form-input
border: none
background: none
color: color-default
width: 100%
font: 13px font-sans
outline: none
&::-webkit-search-results-decoration
&::-webkit-search-cancel-button
-webkit-appearance: none
.search-form-submit
position: absolute
top: 50%
right: 10px
margin-top: -7px
font: 13px font-icon
border: none
background: none
color: #bbb
cursor: pointer
&:hover, &:focus
color: #777 | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
.article
margin: block-margin 0
.article-inner
@extend $block
overflow: hidden
.article-meta
clearfix()
.article-date
@extend $block-caption
float: left
.article-category
float: left
line-height: 1em
color: #ccc
text-shadow: 0 1px #fff
margin-left: 8px
&:before
content: "\2022"
.article-category-link
@extend $block-caption
margin: 0 12px 1em
.article-header
padding: article-padding article-padding 0
.article-title
text-decoration: none
font-size: 2em
font-weight: bold
color: color-default
line-height: line-height-title
transition: color 0.2s
a&:hover
color: color-link
.article-entry
@extend $base-style
clearfix()
color: color-default
padding: 0 article-padding
p, table
line-height: line-height
margin: line-height 0
h1, h2, h3, h4, h5, h6
font-weight: bold
h1, h2, h3, h4, h5, h6
line-height: line-height-title
margin: line-height-title 0
a
color: color-link
text-decoration: none
&:hover
text-decoration: underline
ul, ol, dl
margin-top: line-height
margin-bottom: line-height
img, video
max-width: 100%
height: auto
display: block
margin: auto
iframe
border: none
table
width: 100%
border-collapse: collapse
border-spacing: 0
th
font-weight: bold
border-bottom: 3px solid color-border
padding-bottom: 0.5em
td
border-bottom: 1px solid color-border
padding: 10px 0
blockquote
font-family: font-serif
font-size: 1.4em
margin: line-height 20px
text-align: center
footer
font-size: font-size
margin: line-height 0
font-family: font-sans
cite
&:before
content: "—"
padding: 0 0.5em
.pullquote
text-align: left
width: 45%
margin: 0
&.left
margin-left: 0.5em
margin-right: 1em
&.right
margin-right: 0.5em
margin-left: 1em
.caption
color: color-grey
display: block
font-size: 0.9em
margin-top: 0.5em
position: relative
text-align: center
// http://webdesignerwall.com/tutorials/css-elastic-videos
.video-container
position: relative
padding-top: (9 / 16 * 100)% // 16:9 ratio
height: 0
overflow: hidden
iframe, object, embed
position: absolute
top: 0
left: 0
width: 100%
height: 100%
margin-top: 0
.article-more-link a
display: inline-block
line-height: 1em
padding: 6px 15px
border-radius: 15px
background: color-background
color: color-grey
text-shadow: 0 1px #fff
text-decoration: none
&:hover
background: color-link
color: #fff
text-decoration: none
text-shadow: 0 1px darken(color-link, 20%)
.article-footer
clearfix()
font-size: 0.85em
line-height: line-height
border-top: 1px solid color-border
padding-top: line-height
margin: 0 article-padding article-padding
a
color: color-grey
text-decoration: none
&:hover
color: color-default
.article-tag-list-item
float: left
margin-right: 10px
.article-tag-list-link
&:before
content: "#"
.article-comment-link
float: right
&:before
content: "\f075"
font-family: font-icon
padding-right: 8px
.article-share-link
cursor: pointer
float: right
margin-left: 20px
&:before
content: "\f064"
font-family: font-icon
padding-right: 6px
#article-nav
clearfix()
position: relative
@media mq-normal
margin: block-margin 0
&:before
absolute-center(8px)
content: ""
border-radius: 50%
background: color-border
box-shadow: 0 1px 2px #fff
.article-nav-link-wrap
text-decoration: none
text-shadow: 0 1px #fff
color: color-grey
box-sizing: border-box
margin-top: block-margin
text-align: center
display: block
&:hover
color: color-default
@media mq-normal
width: 50%
margin-top: 0
#article-nav-newer
@media mq-normal
float: left
text-align: right
padding-right: 20px
#article-nav-older
@media mq-normal
float: right
text-align: left
padding-left: 20px
.article-nav-caption
text-transform: uppercase
letter-spacing: 2px
color: color-border
line-height: 1em
font-weight: bold
#article-nav-newer &
margin-right: -2px
.article-nav-title
font-size: 0.85em
line-height: line-height
margin-top: 0.5em
.article-share-box
position: absolute
display: none
background: #fff
box-shadow: 1px 2px 10px rgba(0, 0, 0, 0.2)
border-radius: 3px
margin-left: -145px
overflow: hidden
z-index: 1
&.on
display: block
.article-share-input
width: 100%
background: none
box-sizing: border-box
font: 14px font-sans
padding: 0 15px
color: color-default
outline: none
border: 1px solid color-border
border-radius: 3px 3px 0 0
height: 36px
line-height: 36px
.article-share-links
clearfix()
background: color-background
$article-share-link
width: 50px
height: 36px
display: block
float: left
position: relative
color: #999
text-shadow: 0 1px #fff
&:before
font-size: 20px
font-family: font-icon
absolute-center(@font-size)
text-align: center
&:hover
color: #fff
.article-share-twitter
@extend $article-share-link
&:before
content: "\f099"
&:hover
background: color-twitter
text-shadow: 0 1px darken(color-twitter, 20%)
.article-share-facebook
@extend $article-share-link
&:before
content: "\f09a"
&:hover
background: color-facebook
text-shadow: 0 1px darken(color-facebook, 20%)
.article-share-pinterest
@extend $article-share-link
&:before
content: "\f0d2"
&:hover
background: color-pinterest
text-shadow: 0 1px darken(color-pinterest, 20%)
.article-share-google
@extend $article-share-link
&:before
content: "\f0d5"
&:hover
background: color-google
text-shadow: 0 1px darken(color-google, 20%)
.article-gallery
background: #000
position: relative
.article-gallery-photos
position: relative
overflow: hidden
.article-gallery-img
display: none
max-width: 100%
&:first-child
display: block
&.loaded
position: absolute
display: block
img
display: block
max-width: 100%
margin: 0 auto
/*
$article-gallery-ctrl
position: absolute
top: 0
height: 100%
width: 60px
color: #fff
text-shadow: 0 0 3px rgba(0, 0, 0, 0.3)
opacity: 0.3
transition: opacity 0.2s
cursor: pointer
&:hover
opacity: 0.8
&:before
font-size: 30px
font-family: font-icon
position: absolute
top: 50%
margin-top: @font-size * -0.5
.article-gallery-prev
@extend $article-gallery-ctrl
left: 0
&:before
content: "\f053"
left: 15px
.article-gallery-next
@extend $article-gallery-ctrl
right: 0
&:before
content: "\f054"
right: 15px*/ | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
#sidebar
@media mq-normal
column(sidebar-column)
.widget-wrap
margin: block-margin 0
.widget-title
@extend $block-caption
.widget
color: color-sidebar-text
text-shadow: 0 1px #fff
background: color-widget-background
box-shadow: 0 -1px 4px color-widget-border inset
border: 1px solid color-widget-border
padding: 15px
border-radius: 3px
a
color: color-link
text-decoration: none
&:hover
text-decoration: underline
ul, ol, dl
ul, ol, dl
margin-left: 15px
list-style: disc | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
@media mq-mobile
#mobile-nav
position: absolute
top: 0
left: 0
width: mobile-nav-width
height: 100%
background: color-mobile-nav-background
border-right: 1px solid #fff
@media mq-mobile
.mobile-nav-link
display: block
color: color-grey
text-decoration: none
padding: 15px 20px
font-weight: bold
&:hover
color: #fff
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
// https://github.com/chriskempson/tomorrow-theme
highlight-background = #2d2d2d
highlight-current-line = #393939
highlight-selection = #515151
highlight-foreground = #cccccc
highlight-comment = #999999
highlight-red = #f2777a
highlight-orange = #f99157
highlight-yellow = #ffcc66
highlight-green = #99cc99
highlight-aqua = #66cccc
highlight-blue = #6699cc
highlight-purple = #cc99cc
$code-block
background: highlight-background
margin: 0 article-padding * -1
padding: 15px article-padding
border-style: solid
border-color: color-border
border-width: 1px 0
overflow: auto
color: highlight-foreground
line-height: font-size * line-height
$line-numbers
color: #666
font-size: 0.85em
.article-entry
pre, code
font-family: font-mono
code
background: color-background
text-shadow: 0 1px #fff
padding: 0 0.3em
pre
@extend $code-block
code
background: none
text-shadow: none
padding: 0
.highlight
@extend $code-block
pre
border: none
margin: 0
padding: 0
table
margin: 0
width: auto
td
border: none
padding: 0
figcaption
clearfix()
font-size: 0.85em
color: highlight-comment
line-height: 1em
margin-bottom: 1em
a
float: right
.gutter pre
@extend $line-numbers
text-align: right
padding-right: 20px
.line
height: font-size * line-height
.line.marked
background: highlight-selection
.gist
margin: 0 article-padding * -1
border-style: solid
border-color: color-border
border-width: 1px 0
background: highlight-background
padding: 15px article-padding 15px 0
.gist-file
border: none
font-family: font-mono
margin: 0
.gist-data
background: none
border: none
.line-numbers
@extend $line-numbers
background: none
border: none
padding: 0 20px 0 0
.line-data
padding: 0 !important
.highlight
margin: 0
padding: 0
border: none
.gist-meta
background: highlight-background
color: highlight-comment
font: 0.85em font-sans
text-shadow: 0 0
padding: 0
margin-top: 1em
margin-left: article-padding
a
color: color-link
font-weight: normal
&:hover
text-decoration: underline
pre
.comment
.title
color: highlight-comment
.variable
.attribute
.tag
.regexp
.ruby .constant
.xml .tag .title
.xml .pi
.xml .doctype
.html .doctype
.css .id
.css .class
.css .pseudo
color: highlight-red
.number
.preprocessor
.built_in
.literal
.params
.constant
color: highlight-orange
.class
.ruby .class .title
.css .rules .attribute
color: highlight-green
.string
.value
.inheritance
.header
.ruby .symbol
.xml .cdata
color: highlight-green
.css .hexcolor
color: highlight-aqua
.function
.python .decorator
.python .title
.ruby .function .title
.ruby .title .keyword
.perl .sub
.javascript .title
.coffeescript .title
color: highlight-blue
.keyword
.javascript .function
color: highlight-purple
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
/////////////////
// Semantic.gs // for Stylus: http://learnboost.github.com/stylus/
/////////////////
// Utility function — you should never need to modify this
// _gridsystem-width = (column-width + gutter-width) * columns
gridsystem-width(_columns = columns)
(column-width + gutter-width) * _columns
// Set @total-width to 100% for a fluid layout
// total-width = gridsystem-width(columns)
total-width = 100%
//////////
// GRID //
//////////
body
clearfix()
width: 100%
row(_columns = columns)
clearfix()
display: block
width: total-width * ((gutter-width + gridsystem-width(_columns)) / gridsystem-width(_columns))
margin: 0 total-width * (((gutter-width * .5) / gridsystem-width(_columns)) * -1)
column(x, _columns = columns)
display: inline
float: left
width: total-width * ((((gutter-width + column-width) * x) - gutter-width) / gridsystem-width(_columns))
margin: 0 total-width * ((gutter-width * .5) / gridsystem-width(_columns))
push(offset = 1)
margin-left: total-width * (((gutter-width + column-width) * offset) / gridsystem-width(columns))
pull(offset = 1)
margin-right: total-width * (((gutter-width + column-width) * offset) / gridsystem-width(columns)) | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
// http://www.zeldman.com/2012/03/01/replacing-the-9999px-hack-new-image-replacement/
hide-text()
text-indent: 100%
white-space: nowrap
overflow: hidden
// http://codepen.io/shshaw/full/gEiDt
absolute-center(width, height = width)
// margin: auto
// position: absolute
// top: 50%
// top: 0
// left: 0
// bottom: 0
// right: 0
// width: width
// height: height
// overflow: auto
width: width
height: height
position: absolute
top: 50%
left: 50%
margin-top: width * -0.5
margin-left: height * -0.5
avoid-column-break()
vendor("column-break-inside", avoid, only: webkit)
page-break-inside: avoid // for firefox
overflow: hidden // fix for firefox
break-inside: avoid-column
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
/*!
* fancyBox - jQuery Plugin
* version: 2.1.5 (Fri, 14 Jun 2013)
* requires jQuery v1.6 or later
*
* Examples at http://fancyapps.com/fancybox/
* License: www.fancyapps.com/fancybox/#license
*
* Copyright 2012 Janis Skarnelis - [email protected]
*
*/
;(function (window, document, $, undefined) {
"use strict";
var H = $("html"),
W = $(window),
D = $(document),
F = $.fancybox = function () {
F.open.apply( this, arguments );
},
IE = navigator.userAgent.match(/msie/i),
didUpdate = null,
isTouch = document.createTouch !== undefined,
isQuery = function(obj) {
return obj && obj.hasOwnProperty && obj instanceof $;
},
isString = function(str) {
return str && $.type(str) === "string";
},
isPercentage = function(str) {
return isString(str) && str.indexOf('%') > 0;
},
isScrollable = function(el) {
return (el && !(el.style.overflow && el.style.overflow === 'hidden') && ((el.clientWidth && el.scrollWidth > el.clientWidth) || (el.clientHeight && el.scrollHeight > el.clientHeight)));
},
getScalar = function(orig, dim) {
var value = parseInt(orig, 10) || 0;
if (dim && isPercentage(orig)) {
value = F.getViewport()[ dim ] / 100 * value;
}
return Math.ceil(value);
},
getValue = function(value, dim) {
return getScalar(value, dim) + 'px';
};
$.extend(F, {
// The current version of fancyBox
version: '2.1.5',
defaults: {
padding : 15,
margin : 20,
width : 800,
height : 600,
minWidth : 100,
minHeight : 100,
maxWidth : 9999,
maxHeight : 9999,
pixelRatio: 1, // Set to 2 for retina display support
autoSize : true,
autoHeight : false,
autoWidth : false,
autoResize : true,
autoCenter : !isTouch,
fitToView : true,
aspectRatio : false,
topRatio : 0.5,
leftRatio : 0.5,
scrolling : 'auto', // 'auto', 'yes' or 'no'
wrapCSS : '',
arrows : true,
closeBtn : true,
closeClick : false,
nextClick : false,
mouseWheel : true,
autoPlay : false,
playSpeed : 3000,
preload : 3,
modal : false,
loop : true,
ajax : {
dataType : 'html',
headers : { 'X-fancyBox': true }
},
iframe : {
scrolling : 'auto',
preload : true
},
swf : {
wmode: 'transparent',
allowfullscreen : 'true',
allowscriptaccess : 'always'
},
keys : {
next : {
13 : 'left', // enter
34 : 'up', // page down
39 : 'left', // right arrow
40 : 'up' // down arrow
},
prev : {
8 : 'right', // backspace
33 : 'down', // page up
37 : 'right', // left arrow
38 : 'down' // up arrow
},
close : [27], // escape key
play : [32], // space - start/stop slideshow
toggle : [70] // letter "f" - toggle fullscreen
},
direction : {
next : 'left',
prev : 'right'
},
scrollOutside : true,
// Override some properties
index : 0,
type : null,
href : null,
content : null,
title : null,
// HTML templates
tpl: {
wrap : '<div class="fancybox-wrap" tabIndex="-1"><div class="fancybox-skin"><div class="fancybox-outer"><div class="fancybox-inner"></div></div></div></div>',
image : '<img class="fancybox-image" src="{href}" alt="" />',
iframe : '<iframe id="fancybox-frame{rnd}" name="fancybox-frame{rnd}" class="fancybox-iframe" frameborder="0" vspace="0" hspace="0" webkitAllowFullScreen mozallowfullscreen allowFullScreen' + (IE ? ' allowtransparency="true"' : '') + '></iframe>',
error : '<p class="fancybox-error">The requested content cannot be loaded.<br/>Please try again later.</p>',
closeBtn : '<a title="Close" class="fancybox-item fancybox-close" href="javascript:;"></a>',
next : '<a title="Next" class="fancybox-nav fancybox-next" href="javascript:;"><span></span></a>',
prev : '<a title="Previous" class="fancybox-nav fancybox-prev" href="javascript:;"><span></span></a>'
},
// Properties for each animation type
// Opening fancyBox
openEffect : 'fade', // 'elastic', 'fade' or 'none'
openSpeed : 250,
openEasing : 'swing',
openOpacity : true,
openMethod : 'zoomIn',
// Closing fancyBox
closeEffect : 'fade', // 'elastic', 'fade' or 'none'
closeSpeed : 250,
closeEasing : 'swing',
closeOpacity : true,
closeMethod : 'zoomOut',
// Changing next gallery item
nextEffect : 'elastic', // 'elastic', 'fade' or 'none'
nextSpeed : 250,
nextEasing : 'swing',
nextMethod : 'changeIn',
// Changing previous gallery item
prevEffect : 'elastic', // 'elastic', 'fade' or 'none'
prevSpeed : 250,
prevEasing : 'swing',
prevMethod : 'changeOut',
// Enable default helpers
helpers : {
overlay : true,
title : true
},
// Callbacks
onCancel : $.noop, // If canceling
beforeLoad : $.noop, // Before loading
afterLoad : $.noop, // After loading
beforeShow : $.noop, // Before changing in current item
afterShow : $.noop, // After opening
beforeChange : $.noop, // Before changing gallery item
beforeClose : $.noop, // Before closing
afterClose : $.noop // After closing
},
//Current state
group : {}, // Selected group
opts : {}, // Group options
previous : null, // Previous element
coming : null, // Element being loaded
current : null, // Currently loaded element
isActive : false, // Is activated
isOpen : false, // Is currently open
isOpened : false, // Have been fully opened at least once
wrap : null,
skin : null,
outer : null,
inner : null,
player : {
timer : null,
isActive : false
},
// Loaders
ajaxLoad : null,
imgPreload : null,
// Some collections
transitions : {},
helpers : {},
/*
* Static methods
*/
open: function (group, opts) {
if (!group) {
return;
}
if (!$.isPlainObject(opts)) {
opts = {};
}
// Close if already active
if (false === F.close(true)) {
return;
}
// Normalize group
if (!$.isArray(group)) {
group = isQuery(group) ? $(group).get() : [group];
}
// Recheck if the type of each element is `object` and set content type (image, ajax, etc)
$.each(group, function(i, element) {
var obj = {},
href,
title,
content,
type,
rez,
hrefParts,
selector;
if ($.type(element) === "object") {
// Check if is DOM element
if (element.nodeType) {
element = $(element);
}
if (isQuery(element)) {
obj = {
href : element.data('fancybox-href') || element.attr('href'),
title : $('<div/>').text( element.data('fancybox-title') || element.attr('title') ).html(),
isDom : true,
element : element
};
if ($.metadata) {
$.extend(true, obj, element.metadata());
}
} else {
obj = element;
}
}
href = opts.href || obj.href || (isString(element) ? element : null);
title = opts.title !== undefined ? opts.title : obj.title || '';
content = opts.content || obj.content;
type = content ? 'html' : (opts.type || obj.type);
if (!type && obj.isDom) {
type = element.data('fancybox-type');
if (!type) {
rez = element.prop('class').match(/fancybox\.(\w+)/);
type = rez ? rez[1] : null;
}
}
if (isString(href)) {
// Try to guess the content type
if (!type) {
if (F.isImage(href)) {
type = 'image';
} else if (F.isSWF(href)) {
type = 'swf';
} else if (href.charAt(0) === '#') {
type = 'inline';
} else if (isString(element)) {
type = 'html';
content = element;
}
}
// Split url into two pieces with source url and content selector, e.g,
// "/mypage.html #my_id" will load "/mypage.html" and display element having id "my_id"
if (type === 'ajax') {
hrefParts = href.split(/\s+/, 2);
href = hrefParts.shift();
selector = hrefParts.shift();
}
}
if (!content) {
if (type === 'inline') {
if (href) {
content = $( isString(href) ? href.replace(/.*(?=#[^\s]+$)/, '') : href ); //strip for ie7
} else if (obj.isDom) {
content = element;
}
} else if (type === 'html') {
content = href;
} else if (!type && !href && obj.isDom) {
type = 'inline';
content = element;
}
}
$.extend(obj, {
href : href,
type : type,
content : content,
title : title,
selector : selector
});
group[ i ] = obj;
});
// Extend the defaults
F.opts = $.extend(true, {}, F.defaults, opts);
// All options are merged recursive except keys
if (opts.keys !== undefined) {
F.opts.keys = opts.keys ? $.extend({}, F.defaults.keys, opts.keys) : false;
}
F.group = group;
return F._start(F.opts.index);
},
// Cancel image loading or abort ajax request
cancel: function () {
var coming = F.coming;
if (coming && false === F.trigger('onCancel')) {
return;
}
F.hideLoading();
if (!coming) {
return;
}
if (F.ajaxLoad) {
F.ajaxLoad.abort();
}
F.ajaxLoad = null;
if (F.imgPreload) {
F.imgPreload.onload = F.imgPreload.onerror = null;
}
if (coming.wrap) {
coming.wrap.stop(true, true).trigger('onReset').remove();
}
F.coming = null;
// If the first item has been canceled, then clear everything
if (!F.current) {
F._afterZoomOut( coming );
}
},
// Start closing animation if is open; remove immediately if opening/closing
close: function (event) {
F.cancel();
if (false === F.trigger('beforeClose')) {
return;
}
F.unbindEvents();
if (!F.isActive) {
return;
}
if (!F.isOpen || event === true) {
$('.fancybox-wrap').stop(true).trigger('onReset').remove();
F._afterZoomOut();
} else {
F.isOpen = F.isOpened = false;
F.isClosing = true;
$('.fancybox-item, .fancybox-nav').remove();
F.wrap.stop(true, true).removeClass('fancybox-opened');
F.transitions[ F.current.closeMethod ]();
}
},
// Manage slideshow:
// $.fancybox.play(); - toggle slideshow
// $.fancybox.play( true ); - start
// $.fancybox.play( false ); - stop
play: function ( action ) {
var clear = function () {
clearTimeout(F.player.timer);
},
set = function () {
clear();
if (F.current && F.player.isActive) {
F.player.timer = setTimeout(F.next, F.current.playSpeed);
}
},
stop = function () {
clear();
D.unbind('.player');
F.player.isActive = false;
F.trigger('onPlayEnd');
},
start = function () {
if (F.current && (F.current.loop || F.current.index < F.group.length - 1)) {
F.player.isActive = true;
D.bind({
'onCancel.player beforeClose.player' : stop,
'onUpdate.player' : set,
'beforeLoad.player' : clear
});
set();
F.trigger('onPlayStart');
}
};
if (action === true || (!F.player.isActive && action !== false)) {
start();
} else {
stop();
}
},
// Navigate to next gallery item
next: function ( direction ) {
var current = F.current;
if (current) {
if (!isString(direction)) {
direction = current.direction.next;
}
F.jumpto(current.index + 1, direction, 'next');
}
},
// Navigate to previous gallery item
prev: function ( direction ) {
var current = F.current;
if (current) {
if (!isString(direction)) {
direction = current.direction.prev;
}
F.jumpto(current.index - 1, direction, 'prev');
}
},
// Navigate to gallery item by index
jumpto: function ( index, direction, router ) {
var current = F.current;
if (!current) {
return;
}
index = getScalar(index);
F.direction = direction || current.direction[ (index >= current.index ? 'next' : 'prev') ];
F.router = router || 'jumpto';
if (current.loop) {
if (index < 0) {
index = current.group.length + (index % current.group.length);
}
index = index % current.group.length;
}
if (current.group[ index ] !== undefined) {
F.cancel();
F._start(index);
}
},
// Center inside viewport and toggle position type to fixed or absolute if needed
reposition: function (e, onlyAbsolute) {
var current = F.current,
wrap = current ? current.wrap : null,
pos;
if (wrap) {
pos = F._getPosition(onlyAbsolute);
if (e && e.type === 'scroll') {
delete pos.position;
wrap.stop(true, true).animate(pos, 200);
} else {
wrap.css(pos);
current.pos = $.extend({}, current.dim, pos);
}
}
},
update: function (e) {
var type = (e && e.originalEvent && e.originalEvent.type),
anyway = !type || type === 'orientationchange';
if (anyway) {
clearTimeout(didUpdate);
didUpdate = null;
}
if (!F.isOpen || didUpdate) {
return;
}
didUpdate = setTimeout(function() {
var current = F.current;
if (!current || F.isClosing) {
return;
}
F.wrap.removeClass('fancybox-tmp');
if (anyway || type === 'load' || (type === 'resize' && current.autoResize)) {
F._setDimension();
}
if (!(type === 'scroll' && current.canShrink)) {
F.reposition(e);
}
F.trigger('onUpdate');
didUpdate = null;
}, (anyway && !isTouch ? 0 : 300));
},
// Shrink content to fit inside viewport or restore if resized
toggle: function ( action ) {
if (F.isOpen) {
F.current.fitToView = $.type(action) === "boolean" ? action : !F.current.fitToView;
// Help browser to restore document dimensions
if (isTouch) {
F.wrap.removeAttr('style').addClass('fancybox-tmp');
F.trigger('onUpdate');
}
F.update();
}
},
hideLoading: function () {
D.unbind('.loading');
$('#fancybox-loading').remove();
},
showLoading: function () {
var el, viewport;
F.hideLoading();
el = $('<div id="fancybox-loading"><div></div></div>').click(F.cancel).appendTo('body');
// If user will press the escape-button, the request will be canceled
D.bind('keydown.loading', function(e) {
if ((e.which || e.keyCode) === 27) {
e.preventDefault();
F.cancel();
}
});
if (!F.defaults.fixed) {
viewport = F.getViewport();
el.css({
position : 'absolute',
top : (viewport.h * 0.5) + viewport.y,
left : (viewport.w * 0.5) + viewport.x
});
}
F.trigger('onLoading');
},
getViewport: function () {
var locked = (F.current && F.current.locked) || false,
rez = {
x: W.scrollLeft(),
y: W.scrollTop()
};
if (locked && locked.length) {
rez.w = locked[0].clientWidth;
rez.h = locked[0].clientHeight;
} else {
// See http://bugs.jquery.com/ticket/6724
rez.w = isTouch && window.innerWidth ? window.innerWidth : W.width();
rez.h = isTouch && window.innerHeight ? window.innerHeight : W.height();
}
return rez;
},
// Unbind the keyboard / clicking actions
unbindEvents: function () {
if (F.wrap && isQuery(F.wrap)) {
F.wrap.unbind('.fb');
}
D.unbind('.fb');
W.unbind('.fb');
},
bindEvents: function () {
var current = F.current,
keys;
if (!current) {
return;
}
// Changing document height on iOS devices triggers a 'resize' event,
// that can change document height... repeating infinitely
W.bind('orientationchange.fb' + (isTouch ? '' : ' resize.fb') + (current.autoCenter && !current.locked ? ' scroll.fb' : ''), F.update);
keys = current.keys;
if (keys) {
D.bind('keydown.fb', function (e) {
var code = e.which || e.keyCode,
target = e.target || e.srcElement;
// Skip esc key if loading, because showLoading will cancel preloading
if (code === 27 && F.coming) {
return false;
}
// Ignore key combinations and key events within form elements
if (!e.ctrlKey && !e.altKey && !e.shiftKey && !e.metaKey && !(target && (target.type || $(target).is('[contenteditable]')))) {
$.each(keys, function(i, val) {
if (current.group.length > 1 && val[ code ] !== undefined) {
F[ i ]( val[ code ] );
e.preventDefault();
return false;
}
if ($.inArray(code, val) > -1) {
F[ i ] ();
e.preventDefault();
return false;
}
});
}
});
}
if ($.fn.mousewheel && current.mouseWheel) {
F.wrap.bind('mousewheel.fb', function (e, delta, deltaX, deltaY) {
var target = e.target || null,
parent = $(target),
canScroll = false;
while (parent.length) {
if (canScroll || parent.is('.fancybox-skin') || parent.is('.fancybox-wrap')) {
break;
}
canScroll = isScrollable( parent[0] );
parent = $(parent).parent();
}
if (delta !== 0 && !canScroll) {
if (F.group.length > 1 && !current.canShrink) {
if (deltaY > 0 || deltaX > 0) {
F.prev( deltaY > 0 ? 'down' : 'left' );
} else if (deltaY < 0 || deltaX < 0) {
F.next( deltaY < 0 ? 'up' : 'right' );
}
e.preventDefault();
}
}
});
}
},
trigger: function (event, o) {
var ret, obj = o || F.coming || F.current;
if (obj) {
if ($.isFunction( obj[event] )) {
ret = obj[event].apply(obj, Array.prototype.slice.call(arguments, 1));
}
if (ret === false) {
return false;
}
if (obj.helpers) {
$.each(obj.helpers, function (helper, opts) {
if (opts && F.helpers[helper] && $.isFunction(F.helpers[helper][event])) {
F.helpers[helper][event]($.extend(true, {}, F.helpers[helper].defaults, opts), obj);
}
});
}
}
D.trigger(event);
},
isImage: function (str) {
return isString(str) && str.match(/(^data:image\/.*,)|(\.(jp(e|g|eg)|gif|png|bmp|webp|svg)((\?|#).*)?$)/i);
},
isSWF: function (str) {
return isString(str) && str.match(/\.(swf)((\?|#).*)?$/i);
},
_start: function (index) {
var coming = {},
obj,
href,
type,
margin,
padding;
index = getScalar( index );
obj = F.group[ index ] || null;
if (!obj) {
return false;
}
coming = $.extend(true, {}, F.opts, obj);
// Convert margin and padding properties to array - top, right, bottom, left
margin = coming.margin;
padding = coming.padding;
if ($.type(margin) === 'number') {
coming.margin = [margin, margin, margin, margin];
}
if ($.type(padding) === 'number') {
coming.padding = [padding, padding, padding, padding];
}
// 'modal' propery is just a shortcut
if (coming.modal) {
$.extend(true, coming, {
closeBtn : false,
closeClick : false,
nextClick : false,
arrows : false,
mouseWheel : false,
keys : null,
helpers: {
overlay : {
closeClick : false
}
}
});
}
// 'autoSize' property is a shortcut, too
if (coming.autoSize) {
coming.autoWidth = coming.autoHeight = true;
}
if (coming.width === 'auto') {
coming.autoWidth = true;
}
if (coming.height === 'auto') {
coming.autoHeight = true;
}
/*
* Add reference to the group, so it`s possible to access from callbacks, example:
* afterLoad : function() {
* this.title = 'Image ' + (this.index + 1) + ' of ' + this.group.length + (this.title ? ' - ' + this.title : '');
* }
*/
coming.group = F.group;
coming.index = index;
// Give a chance for callback or helpers to update coming item (type, title, etc)
F.coming = coming;
if (false === F.trigger('beforeLoad')) {
F.coming = null;
return;
}
type = coming.type;
href = coming.href;
if (!type) {
F.coming = null;
//If we can not determine content type then drop silently or display next/prev item if looping through gallery
if (F.current && F.router && F.router !== 'jumpto') {
F.current.index = index;
return F[ F.router ]( F.direction );
}
return false;
}
F.isActive = true;
if (type === 'image' || type === 'swf') {
coming.autoHeight = coming.autoWidth = false;
coming.scrolling = 'visible';
}
if (type === 'image') {
coming.aspectRatio = true;
}
if (type === 'iframe' && isTouch) {
coming.scrolling = 'scroll';
}
// Build the neccessary markup
coming.wrap = $(coming.tpl.wrap).addClass('fancybox-' + (isTouch ? 'mobile' : 'desktop') + ' fancybox-type-' + type + ' fancybox-tmp ' + coming.wrapCSS).appendTo( coming.parent || 'body' );
$.extend(coming, {
skin : $('.fancybox-skin', coming.wrap),
outer : $('.fancybox-outer', coming.wrap),
inner : $('.fancybox-inner', coming.wrap)
});
$.each(["Top", "Right", "Bottom", "Left"], function(i, v) {
coming.skin.css('padding' + v, getValue(coming.padding[ i ]));
});
F.trigger('onReady');
// Check before try to load; 'inline' and 'html' types need content, others - href
if (type === 'inline' || type === 'html') {
if (!coming.content || !coming.content.length) {
return F._error( 'content' );
}
} else if (!href) {
return F._error( 'href' );
}
if (type === 'image') {
F._loadImage();
} else if (type === 'ajax') {
F._loadAjax();
} else if (type === 'iframe') {
F._loadIframe();
} else {
F._afterLoad();
}
},
_error: function ( type ) {
$.extend(F.coming, {
type : 'html',
autoWidth : true,
autoHeight : true,
minWidth : 0,
minHeight : 0,
scrolling : 'no',
hasError : type,
content : F.coming.tpl.error
});
F._afterLoad();
},
_loadImage: function () {
// Reset preload image so it is later possible to check "complete" property
var img = F.imgPreload = new Image();
img.onload = function () {
this.onload = this.onerror = null;
F.coming.width = this.width / F.opts.pixelRatio;
F.coming.height = this.height / F.opts.pixelRatio;
F._afterLoad();
};
img.onerror = function () {
this.onload = this.onerror = null;
F._error( 'image' );
};
img.src = F.coming.href;
if (img.complete !== true) {
F.showLoading();
}
},
_loadAjax: function () {
var coming = F.coming;
F.showLoading();
F.ajaxLoad = $.ajax($.extend({}, coming.ajax, {
url: coming.href,
error: function (jqXHR, textStatus) {
if (F.coming && textStatus !== 'abort') {
F._error( 'ajax', jqXHR );
} else {
F.hideLoading();
}
},
success: function (data, textStatus) {
if (textStatus === 'success') {
coming.content = data;
F._afterLoad();
}
}
}));
},
_loadIframe: function() {
var coming = F.coming,
iframe = $(coming.tpl.iframe.replace(/\{rnd\}/g, new Date().getTime()))
.attr('scrolling', isTouch ? 'auto' : coming.iframe.scrolling)
.attr('src', coming.href);
// This helps IE
$(coming.wrap).bind('onReset', function () {
try {
$(this).find('iframe').hide().attr('src', '//about:blank').end().empty();
} catch (e) {}
});
if (coming.iframe.preload) {
F.showLoading();
iframe.one('load', function() {
$(this).data('ready', 1);
// iOS will lose scrolling if we resize
if (!isTouch) {
$(this).bind('load.fb', F.update);
}
// Without this trick:
// - iframe won't scroll on iOS devices
// - IE7 sometimes displays empty iframe
$(this).parents('.fancybox-wrap').width('100%').removeClass('fancybox-tmp').show();
F._afterLoad();
});
}
coming.content = iframe.appendTo( coming.inner );
if (!coming.iframe.preload) {
F._afterLoad();
}
},
_preloadImages: function() {
var group = F.group,
current = F.current,
len = group.length,
cnt = current.preload ? Math.min(current.preload, len - 1) : 0,
item,
i;
for (i = 1; i <= cnt; i += 1) {
item = group[ (current.index + i ) % len ];
if (item.type === 'image' && item.href) {
new Image().src = item.href;
}
}
},
_afterLoad: function () {
var coming = F.coming,
previous = F.current,
placeholder = 'fancybox-placeholder',
current,
content,
type,
scrolling,
href,
embed;
F.hideLoading();
if (!coming || F.isActive === false) {
return;
}
if (false === F.trigger('afterLoad', coming, previous)) {
coming.wrap.stop(true).trigger('onReset').remove();
F.coming = null;
return;
}
if (previous) {
F.trigger('beforeChange', previous);
previous.wrap.stop(true).removeClass('fancybox-opened')
.find('.fancybox-item, .fancybox-nav')
.remove();
}
F.unbindEvents();
current = coming;
content = coming.content;
type = coming.type;
scrolling = coming.scrolling;
$.extend(F, {
wrap : current.wrap,
skin : current.skin,
outer : current.outer,
inner : current.inner,
current : current,
previous : previous
});
href = current.href;
switch (type) {
case 'inline':
case 'ajax':
case 'html':
if (current.selector) {
content = $('<div>').html(content).find(current.selector);
} else if (isQuery(content)) {
if (!content.data(placeholder)) {
content.data(placeholder, $('<div class="' + placeholder + '"></div>').insertAfter( content ).hide() );
}
content = content.show().detach();
current.wrap.bind('onReset', function () {
if ($(this).find(content).length) {
content.hide().replaceAll( content.data(placeholder) ).data(placeholder, false);
}
});
}
break;
case 'image':
content = current.tpl.image.replace(/\{href\}/g, href);
break;
case 'swf':
content = '<object id="fancybox-swf" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" width="100%" height="100%"><param name="movie" value="' + href + '"></param>';
embed = '';
$.each(current.swf, function(name, val) {
content += '<param name="' + name + '" value="' + val + '"></param>';
embed += ' ' + name + '="' + val + '"';
});
content += '<embed src="' + href + '" type="application/x-shockwave-flash" width="100%" height="100%"' + embed + '></embed></object>';
break;
}
if (!(isQuery(content) && content.parent().is(current.inner))) {
current.inner.append( content );
}
// Give a chance for helpers or callbacks to update elements
F.trigger('beforeShow');
// Set scrolling before calculating dimensions
current.inner.css('overflow', scrolling === 'yes' ? 'scroll' : (scrolling === 'no' ? 'hidden' : scrolling));
// Set initial dimensions and start position
F._setDimension();
F.reposition();
F.isOpen = false;
F.coming = null;
F.bindEvents();
if (!F.isOpened) {
$('.fancybox-wrap').not( current.wrap ).stop(true).trigger('onReset').remove();
} else if (previous.prevMethod) {
F.transitions[ previous.prevMethod ]();
}
F.transitions[ F.isOpened ? current.nextMethod : current.openMethod ]();
F._preloadImages();
},
_setDimension: function () {
var viewport = F.getViewport(),
steps = 0,
canShrink = false,
canExpand = false,
wrap = F.wrap,
skin = F.skin,
inner = F.inner,
current = F.current,
width = current.width,
height = current.height,
minWidth = current.minWidth,
minHeight = current.minHeight,
maxWidth = current.maxWidth,
maxHeight = current.maxHeight,
scrolling = current.scrolling,
scrollOut = current.scrollOutside ? current.scrollbarWidth : 0,
margin = current.margin,
wMargin = getScalar(margin[1] + margin[3]),
hMargin = getScalar(margin[0] + margin[2]),
wPadding,
hPadding,
wSpace,
hSpace,
origWidth,
origHeight,
origMaxWidth,
origMaxHeight,
ratio,
width_,
height_,
maxWidth_,
maxHeight_,
iframe,
body;
// Reset dimensions so we could re-check actual size
wrap.add(skin).add(inner).width('auto').height('auto').removeClass('fancybox-tmp');
wPadding = getScalar(skin.outerWidth(true) - skin.width());
hPadding = getScalar(skin.outerHeight(true) - skin.height());
// Any space between content and viewport (margin, padding, border, title)
wSpace = wMargin + wPadding;
hSpace = hMargin + hPadding;
origWidth = isPercentage(width) ? (viewport.w - wSpace) * getScalar(width) / 100 : width;
origHeight = isPercentage(height) ? (viewport.h - hSpace) * getScalar(height) / 100 : height;
if (current.type === 'iframe') {
iframe = current.content;
if (current.autoHeight && iframe.data('ready') === 1) {
try {
if (iframe[0].contentWindow.document.location) {
inner.width( origWidth ).height(9999);
body = iframe.contents().find('body');
if (scrollOut) {
body.css('overflow-x', 'hidden');
}
origHeight = body.outerHeight(true);
}
} catch (e) {}
}
} else if (current.autoWidth || current.autoHeight) {
inner.addClass( 'fancybox-tmp' );
// Set width or height in case we need to calculate only one dimension
if (!current.autoWidth) {
inner.width( origWidth );
}
if (!current.autoHeight) {
inner.height( origHeight );
}
if (current.autoWidth) {
origWidth = inner.width();
}
if (current.autoHeight) {
origHeight = inner.height();
}
inner.removeClass( 'fancybox-tmp' );
}
width = getScalar( origWidth );
height = getScalar( origHeight );
ratio = origWidth / origHeight;
// Calculations for the content
minWidth = getScalar(isPercentage(minWidth) ? getScalar(minWidth, 'w') - wSpace : minWidth);
maxWidth = getScalar(isPercentage(maxWidth) ? getScalar(maxWidth, 'w') - wSpace : maxWidth);
minHeight = getScalar(isPercentage(minHeight) ? getScalar(minHeight, 'h') - hSpace : minHeight);
maxHeight = getScalar(isPercentage(maxHeight) ? getScalar(maxHeight, 'h') - hSpace : maxHeight);
// These will be used to determine if wrap can fit in the viewport
origMaxWidth = maxWidth;
origMaxHeight = maxHeight;
if (current.fitToView) {
maxWidth = Math.min(viewport.w - wSpace, maxWidth);
maxHeight = Math.min(viewport.h - hSpace, maxHeight);
}
maxWidth_ = viewport.w - wMargin;
maxHeight_ = viewport.h - hMargin;
if (current.aspectRatio) {
if (width > maxWidth) {
width = maxWidth;
height = getScalar(width / ratio);
}
if (height > maxHeight) {
height = maxHeight;
width = getScalar(height * ratio);
}
if (width < minWidth) {
width = minWidth;
height = getScalar(width / ratio);
}
if (height < minHeight) {
height = minHeight;
width = getScalar(height * ratio);
}
} else {
width = Math.max(minWidth, Math.min(width, maxWidth));
if (current.autoHeight && current.type !== 'iframe') {
inner.width( width );
height = inner.height();
}
height = Math.max(minHeight, Math.min(height, maxHeight));
}
// Try to fit inside viewport (including the title)
if (current.fitToView) {
inner.width( width ).height( height );
wrap.width( width + wPadding );
// Real wrap dimensions
width_ = wrap.width();
height_ = wrap.height();
if (current.aspectRatio) {
while ((width_ > maxWidth_ || height_ > maxHeight_) && width > minWidth && height > minHeight) {
if (steps++ > 19) {
break;
}
height = Math.max(minHeight, Math.min(maxHeight, height - 10));
width = getScalar(height * ratio);
if (width < minWidth) {
width = minWidth;
height = getScalar(width / ratio);
}
if (width > maxWidth) {
width = maxWidth;
height = getScalar(width / ratio);
}
inner.width( width ).height( height );
wrap.width( width + wPadding );
width_ = wrap.width();
height_ = wrap.height();
}
} else {
width = Math.max(minWidth, Math.min(width, width - (width_ - maxWidth_)));
height = Math.max(minHeight, Math.min(height, height - (height_ - maxHeight_)));
}
}
if (scrollOut && scrolling === 'auto' && height < origHeight && (width + wPadding + scrollOut) < maxWidth_) {
width += scrollOut;
}
inner.width( width ).height( height );
wrap.width( width + wPadding );
width_ = wrap.width();
height_ = wrap.height();
canShrink = (width_ > maxWidth_ || height_ > maxHeight_) && width > minWidth && height > minHeight;
canExpand = current.aspectRatio ? (width < origMaxWidth && height < origMaxHeight && width < origWidth && height < origHeight) : ((width < origMaxWidth || height < origMaxHeight) && (width < origWidth || height < origHeight));
$.extend(current, {
dim : {
width : getValue( width_ ),
height : getValue( height_ )
},
origWidth : origWidth,
origHeight : origHeight,
canShrink : canShrink,
canExpand : canExpand,
wPadding : wPadding,
hPadding : hPadding,
wrapSpace : height_ - skin.outerHeight(true),
skinSpace : skin.height() - height
});
if (!iframe && current.autoHeight && height > minHeight && height < maxHeight && !canExpand) {
inner.height('auto');
}
},
_getPosition: function (onlyAbsolute) {
var current = F.current,
viewport = F.getViewport(),
margin = current.margin,
width = F.wrap.width() + margin[1] + margin[3],
height = F.wrap.height() + margin[0] + margin[2],
rez = {
position: 'absolute',
top : margin[0],
left : margin[3]
};
if (current.autoCenter && current.fixed && !onlyAbsolute && height <= viewport.h && width <= viewport.w) {
rez.position = 'fixed';
} else if (!current.locked) {
rez.top += viewport.y;
rez.left += viewport.x;
}
rez.top = getValue(Math.max(rez.top, rez.top + ((viewport.h - height) * current.topRatio)));
rez.left = getValue(Math.max(rez.left, rez.left + ((viewport.w - width) * current.leftRatio)));
return rez;
},
_afterZoomIn: function () {
var current = F.current;
if (!current) {
return;
}
F.isOpen = F.isOpened = true;
F.wrap.css('overflow', 'visible').addClass('fancybox-opened').hide().show(0);
F.update();
// Assign a click event
if ( current.closeClick || (current.nextClick && F.group.length > 1) ) {
F.inner.css('cursor', 'pointer').bind('click.fb', function(e) {
if (!$(e.target).is('a') && !$(e.target).parent().is('a')) {
e.preventDefault();
F[ current.closeClick ? 'close' : 'next' ]();
}
});
}
// Create a close button
if (current.closeBtn) {
$(current.tpl.closeBtn).appendTo(F.skin).bind('click.fb', function(e) {
e.preventDefault();
F.close();
});
}
// Create navigation arrows
if (current.arrows && F.group.length > 1) {
if (current.loop || current.index > 0) {
$(current.tpl.prev).appendTo(F.outer).bind('click.fb', F.prev);
}
if (current.loop || current.index < F.group.length - 1) {
$(current.tpl.next).appendTo(F.outer).bind('click.fb', F.next);
}
}
F.trigger('afterShow');
// Stop the slideshow if this is the last item
if (!current.loop && current.index === current.group.length - 1) {
F.play( false );
} else if (F.opts.autoPlay && !F.player.isActive) {
F.opts.autoPlay = false;
F.play(true);
}
},
_afterZoomOut: function ( obj ) {
obj = obj || F.current;
$('.fancybox-wrap').trigger('onReset').remove();
$.extend(F, {
group : {},
opts : {},
router : false,
current : null,
isActive : false,
isOpened : false,
isOpen : false,
isClosing : false,
wrap : null,
skin : null,
outer : null,
inner : null
});
F.trigger('afterClose', obj);
}
});
/*
* Default transitions
*/
F.transitions = {
getOrigPosition: function () {
var current = F.current,
element = current.element,
orig = current.orig,
pos = {},
width = 50,
height = 50,
hPadding = current.hPadding,
wPadding = current.wPadding,
viewport = F.getViewport();
if (!orig && current.isDom && element.is(':visible')) {
orig = element.find('img:first');
if (!orig.length) {
orig = element;
}
}
if (isQuery(orig)) {
pos = orig.offset();
if (orig.is('img')) {
width = orig.outerWidth();
height = orig.outerHeight();
}
} else {
pos.top = viewport.y + (viewport.h - height) * current.topRatio;
pos.left = viewport.x + (viewport.w - width) * current.leftRatio;
}
if (F.wrap.css('position') === 'fixed' || current.locked) {
pos.top -= viewport.y;
pos.left -= viewport.x;
}
pos = {
top : getValue(pos.top - hPadding * current.topRatio),
left : getValue(pos.left - wPadding * current.leftRatio),
width : getValue(width + wPadding),
height : getValue(height + hPadding)
};
return pos;
},
step: function (now, fx) {
var ratio,
padding,
value,
prop = fx.prop,
current = F.current,
wrapSpace = current.wrapSpace,
skinSpace = current.skinSpace;
if (prop === 'width' || prop === 'height') {
ratio = fx.end === fx.start ? 1 : (now - fx.start) / (fx.end - fx.start);
if (F.isClosing) {
ratio = 1 - ratio;
}
padding = prop === 'width' ? current.wPadding : current.hPadding;
value = now - padding;
F.skin[ prop ]( getScalar( prop === 'width' ? value : value - (wrapSpace * ratio) ) );
F.inner[ prop ]( getScalar( prop === 'width' ? value : value - (wrapSpace * ratio) - (skinSpace * ratio) ) );
}
},
zoomIn: function () {
var current = F.current,
startPos = current.pos,
effect = current.openEffect,
elastic = effect === 'elastic',
endPos = $.extend({opacity : 1}, startPos);
// Remove "position" property that breaks older IE
delete endPos.position;
if (elastic) {
startPos = this.getOrigPosition();
if (current.openOpacity) {
startPos.opacity = 0.1;
}
} else if (effect === 'fade') {
startPos.opacity = 0.1;
}
F.wrap.css(startPos).animate(endPos, {
duration : effect === 'none' ? 0 : current.openSpeed,
easing : current.openEasing,
step : elastic ? this.step : null,
complete : F._afterZoomIn
});
},
zoomOut: function () {
var current = F.current,
effect = current.closeEffect,
elastic = effect === 'elastic',
endPos = {opacity : 0.1};
if (elastic) {
endPos = this.getOrigPosition();
if (current.closeOpacity) {
endPos.opacity = 0.1;
}
}
F.wrap.animate(endPos, {
duration : effect === 'none' ? 0 : current.closeSpeed,
easing : current.closeEasing,
step : elastic ? this.step : null,
complete : F._afterZoomOut
});
},
changeIn: function () {
var current = F.current,
effect = current.nextEffect,
startPos = current.pos,
endPos = { opacity : 1 },
direction = F.direction,
distance = 200,
field;
startPos.opacity = 0.1;
if (effect === 'elastic') {
field = direction === 'down' || direction === 'up' ? 'top' : 'left';
if (direction === 'down' || direction === 'right') {
startPos[ field ] = getValue(getScalar(startPos[ field ]) - distance);
endPos[ field ] = '+=' + distance + 'px';
} else {
startPos[ field ] = getValue(getScalar(startPos[ field ]) + distance);
endPos[ field ] = '-=' + distance + 'px';
}
}
// Workaround for http://bugs.jquery.com/ticket/12273
if (effect === 'none') {
F._afterZoomIn();
} else {
F.wrap.css(startPos).animate(endPos, {
duration : current.nextSpeed,
easing : current.nextEasing,
complete : F._afterZoomIn
});
}
},
changeOut: function () {
var previous = F.previous,
effect = previous.prevEffect,
endPos = { opacity : 0.1 },
direction = F.direction,
distance = 200;
if (effect === 'elastic') {
endPos[ direction === 'down' || direction === 'up' ? 'top' : 'left' ] = ( direction === 'up' || direction === 'left' ? '-' : '+' ) + '=' + distance + 'px';
}
previous.wrap.animate(endPos, {
duration : effect === 'none' ? 0 : previous.prevSpeed,
easing : previous.prevEasing,
complete : function () {
$(this).trigger('onReset').remove();
}
});
}
};
/*
* Overlay helper
*/
F.helpers.overlay = {
defaults : {
closeClick : true, // if true, fancyBox will be closed when user clicks on the overlay
speedOut : 200, // duration of fadeOut animation
showEarly : true, // indicates if should be opened immediately or wait until the content is ready
css : {}, // custom CSS properties
locked : !isTouch, // if true, the content will be locked into overlay
fixed : true // if false, the overlay CSS position property will not be set to "fixed"
},
overlay : null, // current handle
fixed : false, // indicates if the overlay has position "fixed"
el : $('html'), // element that contains "the lock"
// Public methods
create : function(opts) {
var parent;
opts = $.extend({}, this.defaults, opts);
if (this.overlay) {
this.close();
}
parent = F.coming ? F.coming.parent : opts.parent;
this.overlay = $('<div class="fancybox-overlay"></div>').appendTo( parent && parent.lenth ? parent : 'body' );
this.fixed = false;
if (opts.fixed && F.defaults.fixed) {
this.overlay.addClass('fancybox-overlay-fixed');
this.fixed = true;
}
},
open : function(opts) {
var that = this;
opts = $.extend({}, this.defaults, opts);
if (this.overlay) {
this.overlay.unbind('.overlay').width('auto').height('auto');
} else {
this.create(opts);
}
if (!this.fixed) {
W.bind('resize.overlay', $.proxy( this.update, this) );
this.update();
}
if (opts.closeClick) {
this.overlay.bind('click.overlay', function(e) {
if ($(e.target).hasClass('fancybox-overlay')) {
if (F.isActive) {
F.close();
} else {
that.close();
}
return false;
}
});
}
this.overlay.css( opts.css ).show();
},
close : function() {
W.unbind('resize.overlay');
if (this.el.hasClass('fancybox-lock')) {
$('.fancybox-margin').removeClass('fancybox-margin');
this.el.removeClass('fancybox-lock');
W.scrollTop( this.scrollV ).scrollLeft( this.scrollH );
}
$('.fancybox-overlay').remove().hide();
$.extend(this, {
overlay : null,
fixed : false
});
},
// Private, callbacks
update : function () {
var width = '100%', offsetWidth;
// Reset width/height so it will not mess
this.overlay.width(width).height('100%');
// jQuery does not return reliable result for IE
if (IE) {
offsetWidth = Math.max(document.documentElement.offsetWidth, document.body.offsetWidth);
if (D.width() > offsetWidth) {
width = D.width();
}
} else if (D.width() > W.width()) {
width = D.width();
}
this.overlay.width(width).height(D.height());
},
// This is where we can manipulate DOM, because later it would cause iframes to reload
onReady : function (opts, obj) {
var overlay = this.overlay;
$('.fancybox-overlay').stop(true, true);
if (!overlay) {
this.create(opts);
}
if (opts.locked && this.fixed && obj.fixed) {
obj.locked = this.overlay.append( obj.wrap );
obj.fixed = false;
}
if (opts.showEarly === true) {
this.beforeShow.apply(this, arguments);
}
},
beforeShow : function(opts, obj) {
if (obj.locked && !this.el.hasClass('fancybox-lock')) {
if (this.fixPosition !== false) {
$('*').filter(function(){
return ($(this).css('position') === 'fixed' && !$(this).hasClass("fancybox-overlay") && !$(this).hasClass("fancybox-wrap") );
}).addClass('fancybox-margin');
}
this.el.addClass('fancybox-margin');
this.scrollV = W.scrollTop();
this.scrollH = W.scrollLeft();
this.el.addClass('fancybox-lock');
W.scrollTop( this.scrollV ).scrollLeft( this.scrollH );
}
this.open(opts);
},
onUpdate : function() {
if (!this.fixed) {
this.update();
}
},
afterClose: function (opts) {
// Remove overlay if exists and fancyBox is not opening
// (e.g., it is not being open using afterClose callback)
if (this.overlay && !F.coming) {
this.overlay.fadeOut(opts.speedOut, $.proxy( this.close, this ));
}
}
};
/*
* Title helper
*/
F.helpers.title = {
defaults : {
type : 'float', // 'float', 'inside', 'outside' or 'over',
position : 'bottom' // 'top' or 'bottom'
},
beforeShow: function (opts) {
var current = F.current,
text = current.title,
type = opts.type,
title,
target;
if ($.isFunction(text)) {
text = text.call(current.element, current);
}
if (!isString(text) || $.trim(text) === '') {
return;
}
title = $('<div class="fancybox-title fancybox-title-' + type + '-wrap">' + text + '</div>');
switch (type) {
case 'inside':
target = F.skin;
break;
case 'outside':
target = F.wrap;
break;
case 'over':
target = F.inner;
break;
default: // 'float'
target = F.skin;
title.appendTo('body');
if (IE) {
title.width( title.width() );
}
title.wrapInner('<span class="child"></span>');
//Increase bottom margin so this title will also fit into viewport
F.current.margin[2] += Math.abs( getScalar(title.css('margin-bottom')) );
break;
}
title[ (opts.position === 'top' ? 'prependTo' : 'appendTo') ](target);
}
};
// jQuery plugin initialization
$.fn.fancybox = function (options) {
var index,
that = $(this),
selector = this.selector || '',
run = function(e) {
var what = $(this).blur(), idx = index, relType, relVal;
if (!(e.ctrlKey || e.altKey || e.shiftKey || e.metaKey) && !what.is('.fancybox-wrap')) {
relType = options.groupAttr || 'data-fancybox-group';
relVal = what.attr(relType);
if (!relVal) {
relType = 'rel';
relVal = what.get(0)[ relType ];
}
if (relVal && relVal !== '' && relVal !== 'nofollow') {
what = selector.length ? $(selector) : that;
what = what.filter('[' + relType + '="' + relVal + '"]');
idx = what.index(this);
}
options.index = idx;
// Stop an event from bubbling if everything is fine
if (F.open(what, options) !== false) {
e.preventDefault();
}
}
};
options = options || {};
index = options.index || 0;
if (!selector || options.live === false) {
that.unbind('click.fb-start').bind('click.fb-start', run);
} else {
D.undelegate(selector, 'click.fb-start').delegate(selector + ":not('.fancybox-item, .fancybox-nav')", 'click.fb-start', run);
}
this.filter('[data-fancybox-start=1]').trigger('click');
return this;
};
// Tests that need a body at doc ready
D.ready(function() {
var w1, w2;
if ( $.scrollbarWidth === undefined ) {
// http://benalman.com/projects/jquery-misc-plugins/#scrollbarwidth
$.scrollbarWidth = function() {
var parent = $('<div style="width:50px;height:50px;overflow:auto"><div/></div>').appendTo('body'),
child = parent.children(),
width = child.innerWidth() - child.height( 99 ).innerWidth();
parent.remove();
return width;
};
}
if ( $.support.fixedPosition === undefined ) {
$.support.fixedPosition = (function() {
var elem = $('<div style="position:fixed;top:20px;"></div>').appendTo('body'),
fixed = ( elem[0].offsetTop === 20 || elem[0].offsetTop === 15 );
elem.remove();
return fixed;
}());
}
$.extend(F.defaults, {
scrollbarWidth : $.scrollbarWidth(),
fixed : $.support.fixedPosition,
parent : $('body')
});
//Get real width of page scroll-bar
w1 = $(window).width();
H.addClass('fancybox-lock-test');
w2 = $(window).width();
H.removeClass('fancybox-lock-test');
$("<style type='text/css'>.fancybox-margin{margin-right:" + (w2 - w1) + "px;}</style>").appendTo("head");
});
}(window, document, jQuery)); | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
/*! fancyBox v2.1.5 fancyapps.com | fancyapps.com/fancybox/#license */
.fancybox-wrap,
.fancybox-skin,
.fancybox-outer,
.fancybox-inner,
.fancybox-image,
.fancybox-wrap iframe,
.fancybox-wrap object,
.fancybox-nav,
.fancybox-nav span,
.fancybox-tmp
{
padding: 0;
margin: 0;
border: 0;
outline: none;
vertical-align: top;
}
.fancybox-wrap {
position: absolute;
top: 0;
left: 0;
z-index: 8020;
}
.fancybox-skin {
position: relative;
background: #f9f9f9;
color: #444;
text-shadow: none;
-webkit-border-radius: 4px;
-moz-border-radius: 4px;
border-radius: 4px;
}
.fancybox-opened {
z-index: 8030;
}
.fancybox-opened .fancybox-skin {
-webkit-box-shadow: 0 10px 25px rgba(0, 0, 0, 0.5);
-moz-box-shadow: 0 10px 25px rgba(0, 0, 0, 0.5);
box-shadow: 0 10px 25px rgba(0, 0, 0, 0.5);
}
.fancybox-outer, .fancybox-inner {
position: relative;
}
.fancybox-inner {
overflow: hidden;
}
.fancybox-type-iframe .fancybox-inner {
-webkit-overflow-scrolling: touch;
}
.fancybox-error {
color: #444;
font: 14px/20px "Helvetica Neue",Helvetica,Arial,sans-serif;
margin: 0;
padding: 15px;
white-space: nowrap;
}
.fancybox-image, .fancybox-iframe {
display: block;
width: 100%;
height: 100%;
}
.fancybox-image {
max-width: 100%;
max-height: 100%;
}
#fancybox-loading, .fancybox-close, .fancybox-prev span, .fancybox-next span {
background-image: url(fancybox_sprite.png);
}
#fancybox-loading {
position: fixed;
top: 50%;
left: 50%;
margin-top: -22px;
margin-left: -22px;
background-position: 0 -108px;
opacity: 0.8;
cursor: pointer;
z-index: 8060;
}
#fancybox-loading div {
width: 44px;
height: 44px;
background: url(fancybox_loading.gif) center center no-repeat;
}
.fancybox-close {
position: absolute;
top: -18px;
right: -18px;
width: 36px;
height: 36px;
cursor: pointer;
z-index: 8040;
}
.fancybox-nav {
position: absolute;
top: 0;
width: 40%;
height: 100%;
cursor: pointer;
text-decoration: none;
background: transparent url(blank.gif); /* helps IE */
-webkit-tap-highlight-color: rgba(0,0,0,0);
z-index: 8040;
}
.fancybox-prev {
left: 0;
}
.fancybox-next {
right: 0;
}
.fancybox-nav span {
position: absolute;
top: 50%;
width: 36px;
height: 34px;
margin-top: -18px;
cursor: pointer;
z-index: 8040;
visibility: hidden;
}
.fancybox-prev span {
left: 10px;
background-position: 0 -36px;
}
.fancybox-next span {
right: 10px;
background-position: 0 -72px;
}
.fancybox-nav:hover span {
visibility: visible;
}
.fancybox-tmp {
position: absolute;
top: -99999px;
left: -99999px;
max-width: 99999px;
max-height: 99999px;
overflow: visible !important;
}
/* Overlay helper */
.fancybox-lock {
overflow: visible !important;
width: auto;
}
.fancybox-lock body {
overflow: hidden !important;
}
.fancybox-lock-test {
overflow-y: hidden !important;
}
.fancybox-overlay {
position: absolute;
top: 0;
left: 0;
overflow: hidden;
display: none;
z-index: 8010;
background: url(fancybox_overlay.png);
}
.fancybox-overlay-fixed {
position: fixed;
bottom: 0;
right: 0;
}
.fancybox-lock .fancybox-overlay {
overflow: auto;
overflow-y: scroll;
}
/* Title helper */
.fancybox-title {
visibility: hidden;
font: normal 13px/20px "Helvetica Neue",Helvetica,Arial,sans-serif;
position: relative;
text-shadow: none;
z-index: 8050;
}
.fancybox-opened .fancybox-title {
visibility: visible;
}
.fancybox-title-float-wrap {
position: absolute;
bottom: 0;
right: 50%;
margin-bottom: -35px;
z-index: 8050;
text-align: center;
}
.fancybox-title-float-wrap .child {
display: inline-block;
margin-right: -100%;
padding: 2px 20px;
background: transparent; /* Fallback for web browsers that doesn't support RGBa */
background: rgba(0, 0, 0, 0.8);
-webkit-border-radius: 15px;
-moz-border-radius: 15px;
border-radius: 15px;
text-shadow: 0 1px 2px #222;
color: #FFF;
font-weight: bold;
line-height: 24px;
white-space: nowrap;
}
.fancybox-title-outside-wrap {
position: relative;
margin-top: 10px;
color: #fff;
}
.fancybox-title-inside-wrap {
padding-top: 10px;
}
.fancybox-title-over-wrap {
position: absolute;
bottom: 0;
left: 0;
color: #fff;
padding: 10px;
background: #000;
background: rgba(0, 0, 0, .8);
}
/*Retina graphics!*/
@media only screen and (-webkit-min-device-pixel-ratio: 1.5),
only screen and (min--moz-device-pixel-ratio: 1.5),
only screen and (min-device-pixel-ratio: 1.5){
#fancybox-loading, .fancybox-close, .fancybox-prev span, .fancybox-next span {
background-image: url([email protected]);
background-size: 44px 152px; /*The size of the normal image, half the size of the hi-res image*/
}
#fancybox-loading div {
background-image: url([email protected]);
background-size: 24px 24px; /*The size of the normal image, half the size of the hi-res image*/
}
} | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
/*!
* Media helper for fancyBox
* version: 1.0.6 (Fri, 14 Jun 2013)
* @requires fancyBox v2.0 or later
*
* Usage:
* $(".fancybox").fancybox({
* helpers : {
* media: true
* }
* });
*
* Set custom URL parameters:
* $(".fancybox").fancybox({
* helpers : {
* media: {
* youtube : {
* params : {
* autoplay : 0
* }
* }
* }
* }
* });
*
* Or:
* $(".fancybox").fancybox({,
* helpers : {
* media: true
* },
* youtube : {
* autoplay: 0
* }
* });
*
* Supports:
*
* Youtube
* http://www.youtube.com/watch?v=opj24KnzrWo
* http://www.youtube.com/embed/opj24KnzrWo
* http://youtu.be/opj24KnzrWo
* http://www.youtube-nocookie.com/embed/opj24KnzrWo
* Vimeo
* http://vimeo.com/40648169
* http://vimeo.com/channels/staffpicks/38843628
* http://vimeo.com/groups/surrealism/videos/36516384
* http://player.vimeo.com/video/45074303
* Metacafe
* http://www.metacafe.com/watch/7635964/dr_seuss_the_lorax_movie_trailer/
* http://www.metacafe.com/watch/7635964/
* Dailymotion
* http://www.dailymotion.com/video/xoytqh_dr-seuss-the-lorax-premiere_people
* Twitvid
* http://twitvid.com/QY7MD
* Twitpic
* http://twitpic.com/7p93st
* Instagram
* http://instagr.am/p/IejkuUGxQn/
* http://instagram.com/p/IejkuUGxQn/
* Google maps
* http://maps.google.com/maps?q=Eiffel+Tower,+Avenue+Gustave+Eiffel,+Paris,+France&t=h&z=17
* http://maps.google.com/?ll=48.857995,2.294297&spn=0.007666,0.021136&t=m&z=16
* http://maps.google.com/?ll=48.859463,2.292626&spn=0.000965,0.002642&t=m&z=19&layer=c&cbll=48.859524,2.292532&panoid=YJ0lq28OOy3VT2IqIuVY0g&cbp=12,151.58,,0,-15.56
*/
;(function ($) {
"use strict";
//Shortcut for fancyBox object
var F = $.fancybox,
format = function( url, rez, params ) {
params = params || '';
if ( $.type( params ) === "object" ) {
params = $.param(params, true);
}
$.each(rez, function(key, value) {
url = url.replace( '$' + key, value || '' );
});
if (params.length) {
url += ( url.indexOf('?') > 0 ? '&' : '?' ) + params;
}
return url;
};
//Add helper object
F.helpers.media = {
defaults : {
youtube : {
matcher : /(youtube\.com|youtu\.be|youtube-nocookie\.com)\/(watch\?v=|v\/|u\/|embed\/?)?(videoseries\?list=(.*)|[\w-]{11}|\?listType=(.*)&list=(.*)).*/i,
params : {
autoplay : 1,
autohide : 1,
fs : 1,
rel : 0,
hd : 1,
wmode : 'opaque',
enablejsapi : 1
},
type : 'iframe',
url : '//www.youtube.com/embed/$3'
},
vimeo : {
matcher : /(?:vimeo(?:pro)?.com)\/(?:[^\d]+)?(\d+)(?:.*)/,
params : {
autoplay : 1,
hd : 1,
show_title : 1,
show_byline : 1,
show_portrait : 0,
fullscreen : 1
},
type : 'iframe',
url : '//player.vimeo.com/video/$1'
},
metacafe : {
matcher : /metacafe.com\/(?:watch|fplayer)\/([\w\-]{1,10})/,
params : {
autoPlay : 'yes'
},
type : 'swf',
url : function( rez, params, obj ) {
obj.swf.flashVars = 'playerVars=' + $.param( params, true );
return '//www.metacafe.com/fplayer/' + rez[1] + '/.swf';
}
},
dailymotion : {
matcher : /dailymotion.com\/video\/(.*)\/?(.*)/,
params : {
additionalInfos : 0,
autoStart : 1
},
type : 'swf',
url : '//www.dailymotion.com/swf/video/$1'
},
twitvid : {
matcher : /twitvid\.com\/([a-zA-Z0-9_\-\?\=]+)/i,
params : {
autoplay : 0
},
type : 'iframe',
url : '//www.twitvid.com/embed.php?guid=$1'
},
twitpic : {
matcher : /twitpic\.com\/(?!(?:place|photos|events)\/)([a-zA-Z0-9\?\=\-]+)/i,
type : 'image',
url : '//twitpic.com/show/full/$1/'
},
instagram : {
matcher : /(instagr\.am|instagram\.com)\/p\/([a-zA-Z0-9_\-]+)\/?/i,
type : 'image',
url : '//$1/p/$2/media/?size=l'
},
google_maps : {
matcher : /maps\.google\.([a-z]{2,3}(\.[a-z]{2})?)\/(\?ll=|maps\?)(.*)/i,
type : 'iframe',
url : function( rez ) {
return '//maps.google.' + rez[1] + '/' + rez[3] + '' + rez[4] + '&output=' + (rez[4].indexOf('layer=c') > 0 ? 'svembed' : 'embed');
}
}
},
beforeLoad : function(opts, obj) {
var url = obj.href || '',
type = false,
what,
item,
rez,
params;
for (what in opts) {
if (opts.hasOwnProperty(what)) {
item = opts[ what ];
rez = url.match( item.matcher );
if (rez) {
type = item.type;
params = $.extend(true, {}, item.params, obj[ what ] || ($.isPlainObject(opts[ what ]) ? opts[ what ].params : null));
url = $.type( item.url ) === "function" ? item.url.call( this, rez, params, obj ) : format( item.url, rez, params );
break;
}
}
}
if (type) {
obj.href = url;
obj.type = type;
obj.autoHeight = false;
}
}
};
}(jQuery)); | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
#fancybox-thumbs {
position: fixed;
left: 0;
width: 100%;
overflow: hidden;
z-index: 8050;
}
#fancybox-thumbs.bottom {
bottom: 2px;
}
#fancybox-thumbs.top {
top: 2px;
}
#fancybox-thumbs ul {
position: relative;
list-style: none;
margin: 0;
padding: 0;
}
#fancybox-thumbs ul li {
float: left;
padding: 1px;
opacity: 0.5;
}
#fancybox-thumbs ul li.active {
opacity: 0.75;
padding: 0;
border: 1px solid #fff;
}
#fancybox-thumbs ul li:hover {
opacity: 1;
}
#fancybox-thumbs ul li a {
display: block;
position: relative;
overflow: hidden;
border: 1px solid #222;
background: #111;
outline: none;
}
#fancybox-thumbs ul li img {
display: block;
position: relative;
border: 0;
padding: 0;
max-width: none;
} | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
/*!
* Buttons helper for fancyBox
* version: 1.0.5 (Mon, 15 Oct 2012)
* @requires fancyBox v2.0 or later
*
* Usage:
* $(".fancybox").fancybox({
* helpers : {
* buttons: {
* position : 'top'
* }
* }
* });
*
*/
;(function ($) {
//Shortcut for fancyBox object
var F = $.fancybox;
//Add helper object
F.helpers.buttons = {
defaults : {
skipSingle : false, // disables if gallery contains single image
position : 'top', // 'top' or 'bottom'
tpl : '<div id="fancybox-buttons"><ul><li><a class="btnPrev" title="Previous" href="javascript:;"></a></li><li><a class="btnPlay" title="Start slideshow" href="javascript:;"></a></li><li><a class="btnNext" title="Next" href="javascript:;"></a></li><li><a class="btnToggle" title="Toggle size" href="javascript:;"></a></li><li><a class="btnClose" title="Close" href="javascript:;"></a></li></ul></div>'
},
list : null,
buttons: null,
beforeLoad: function (opts, obj) {
//Remove self if gallery do not have at least two items
if (opts.skipSingle && obj.group.length < 2) {
obj.helpers.buttons = false;
obj.closeBtn = true;
return;
}
//Increase top margin to give space for buttons
obj.margin[ opts.position === 'bottom' ? 2 : 0 ] += 30;
},
onPlayStart: function () {
if (this.buttons) {
this.buttons.play.attr('title', 'Pause slideshow').addClass('btnPlayOn');
}
},
onPlayEnd: function () {
if (this.buttons) {
this.buttons.play.attr('title', 'Start slideshow').removeClass('btnPlayOn');
}
},
afterShow: function (opts, obj) {
var buttons = this.buttons;
if (!buttons) {
this.list = $(opts.tpl).addClass(opts.position).appendTo('body');
buttons = {
prev : this.list.find('.btnPrev').click( F.prev ),
next : this.list.find('.btnNext').click( F.next ),
play : this.list.find('.btnPlay').click( F.play ),
toggle : this.list.find('.btnToggle').click( F.toggle ),
close : this.list.find('.btnClose').click( F.close )
}
}
//Prev
if (obj.index > 0 || obj.loop) {
buttons.prev.removeClass('btnDisabled');
} else {
buttons.prev.addClass('btnDisabled');
}
//Next / Play
if (obj.loop || obj.index < obj.group.length - 1) {
buttons.next.removeClass('btnDisabled');
buttons.play.removeClass('btnDisabled');
} else {
buttons.next.addClass('btnDisabled');
buttons.play.addClass('btnDisabled');
}
this.buttons = buttons;
this.onUpdate(opts, obj);
},
onUpdate: function (opts, obj) {
var toggle;
if (!this.buttons) {
return;
}
toggle = this.buttons.toggle.removeClass('btnDisabled btnToggleOn');
//Size toggle button
if (obj.canShrink) {
toggle.addClass('btnToggleOn');
} else if (!obj.canExpand) {
toggle.addClass('btnDisabled');
}
},
beforeClose: function () {
if (this.list) {
this.list.remove();
}
this.list = null;
this.buttons = null;
}
};
}(jQuery));
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
/*!
* Thumbnail helper for fancyBox
* version: 1.0.7 (Mon, 01 Oct 2012)
* @requires fancyBox v2.0 or later
*
* Usage:
* $(".fancybox").fancybox({
* helpers : {
* thumbs: {
* width : 50,
* height : 50
* }
* }
* });
*
*/
;(function ($) {
//Shortcut for fancyBox object
var F = $.fancybox;
//Add helper object
F.helpers.thumbs = {
defaults : {
width : 50, // thumbnail width
height : 50, // thumbnail height
position : 'bottom', // 'top' or 'bottom'
source : function ( item ) { // function to obtain the URL of the thumbnail image
var href;
if (item.element) {
href = $(item.element).find('img').attr('src');
}
if (!href && item.type === 'image' && item.href) {
href = item.href;
}
return href;
}
},
wrap : null,
list : null,
width : 0,
init: function (opts, obj) {
var that = this,
list,
thumbWidth = opts.width,
thumbHeight = opts.height,
thumbSource = opts.source;
//Build list structure
list = '';
for (var n = 0; n < obj.group.length; n++) {
list += '<li><a style="width:' + thumbWidth + 'px;height:' + thumbHeight + 'px;" href="javascript:jQuery.fancybox.jumpto(' + n + ');"></a></li>';
}
this.wrap = $('<div id="fancybox-thumbs"></div>').addClass(opts.position).appendTo('body');
this.list = $('<ul>' + list + '</ul>').appendTo(this.wrap);
//Load each thumbnail
$.each(obj.group, function (i) {
var el = obj.group[ i ],
href = thumbSource( el );
if (!href) {
return;
}
$("<img />").load(function () {
var width = this.width,
height = this.height,
widthRatio, heightRatio, parent;
if (!that.list || !width || !height) {
return;
}
//Calculate thumbnail width/height and center it
widthRatio = width / thumbWidth;
heightRatio = height / thumbHeight;
parent = that.list.children().eq(i).find('a');
if (widthRatio >= 1 && heightRatio >= 1) {
if (widthRatio > heightRatio) {
width = Math.floor(width / heightRatio);
height = thumbHeight;
} else {
width = thumbWidth;
height = Math.floor(height / widthRatio);
}
}
$(this).css({
width : width,
height : height,
top : Math.floor(thumbHeight / 2 - height / 2),
left : Math.floor(thumbWidth / 2 - width / 2)
});
parent.width(thumbWidth).height(thumbHeight);
$(this).hide().appendTo(parent).fadeIn(300);
})
.attr('src', href)
.attr('title', el.title);
});
//Set initial width
this.width = this.list.children().eq(0).outerWidth(true);
this.list.width(this.width * (obj.group.length + 1)).css('left', Math.floor($(window).width() * 0.5 - (obj.index * this.width + this.width * 0.5)));
},
beforeLoad: function (opts, obj) {
//Remove self if gallery do not have at least two items
if (obj.group.length < 2) {
obj.helpers.thumbs = false;
return;
}
//Increase bottom margin to give space for thumbs
obj.margin[ opts.position === 'top' ? 0 : 2 ] += ((opts.height) + 15);
},
afterShow: function (opts, obj) {
//Check if exists and create or update list
if (this.list) {
this.onUpdate(opts, obj);
} else {
this.init(opts, obj);
}
//Set active element
this.list.children().removeClass('active').eq(obj.index).addClass('active');
},
//Center list
onUpdate: function (opts, obj) {
if (this.list) {
this.list.stop(true).animate({
'left': Math.floor($(window).width() * 0.5 - (obj.index * this.width + this.width * 0.5))
}, 150);
}
},
beforeClose: function () {
if (this.wrap) {
this.wrap.remove();
}
this.wrap = null;
this.list = null;
this.width = 0;
}
}
}(jQuery)); | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
#fancybox-buttons {
position: fixed;
left: 0;
width: 100%;
z-index: 8050;
}
#fancybox-buttons.top {
top: 10px;
}
#fancybox-buttons.bottom {
bottom: 10px;
}
#fancybox-buttons ul {
display: block;
width: 166px;
height: 30px;
margin: 0 auto;
padding: 0;
list-style: none;
border: 1px solid #111;
border-radius: 3px;
-webkit-box-shadow: inset 0 0 0 1px rgba(255,255,255,.05);
-moz-box-shadow: inset 0 0 0 1px rgba(255,255,255,.05);
box-shadow: inset 0 0 0 1px rgba(255,255,255,.05);
background: rgb(50,50,50);
background: -moz-linear-gradient(top, rgb(68,68,68) 0%, rgb(52,52,52) 50%, rgb(41,41,41) 50%, rgb(51,51,51) 100%);
background: -webkit-gradient(linear, left top, left bottom, color-stop(0%,rgb(68,68,68)), color-stop(50%,rgb(52,52,52)), color-stop(50%,rgb(41,41,41)), color-stop(100%,rgb(51,51,51)));
background: -webkit-linear-gradient(top, rgb(68,68,68) 0%,rgb(52,52,52) 50%,rgb(41,41,41) 50%,rgb(51,51,51) 100%);
background: -o-linear-gradient(top, rgb(68,68,68) 0%,rgb(52,52,52) 50%,rgb(41,41,41) 50%,rgb(51,51,51) 100%);
background: -ms-linear-gradient(top, rgb(68,68,68) 0%,rgb(52,52,52) 50%,rgb(41,41,41) 50%,rgb(51,51,51) 100%);
background: linear-gradient(top, rgb(68,68,68) 0%,rgb(52,52,52) 50%,rgb(41,41,41) 50%,rgb(51,51,51) 100%);
filter: progid:DXImageTransform.Microsoft.gradient( startColorstr='#444444', endColorstr='#222222',GradientType=0 );
}
#fancybox-buttons ul li {
float: left;
margin: 0;
padding: 0;
}
#fancybox-buttons a {
display: block;
width: 30px;
height: 30px;
text-indent: -9999px;
background-color: transparent;
background-image: url('fancybox_buttons.png');
background-repeat: no-repeat;
outline: none;
opacity: 0.8;
}
#fancybox-buttons a:hover {
opacity: 1;
}
#fancybox-buttons a.btnPrev {
background-position: 5px 0;
}
#fancybox-buttons a.btnNext {
background-position: -33px 0;
border-right: 1px solid #3e3e3e;
}
#fancybox-buttons a.btnPlay {
background-position: 0 -30px;
}
#fancybox-buttons a.btnPlayOn {
background-position: -30px -30px;
}
#fancybox-buttons a.btnToggle {
background-position: 3px -60px;
border-left: 1px solid #111;
border-right: 1px solid #3e3e3e;
width: 35px
}
#fancybox-buttons a.btnToggleOn {
background-position: -27px -60px;
}
#fancybox-buttons a.btnClose {
border-left: 1px solid #111;
width: 35px;
background-position: -56px 0px;
}
#fancybox-buttons a.btnDisabled {
opacity : 0.4;
cursor: default;
} | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
(function($){
// Search
var $searchWrap = $('#search-form-wrap'),
isSearchAnim = false,
searchAnimDuration = 200;
var startSearchAnim = function(){
isSearchAnim = true;
};
var stopSearchAnim = function(callback){
setTimeout(function(){
isSearchAnim = false;
callback && callback();
}, searchAnimDuration);
};
$('#nav-search-btn').on('click', function(){
if (isSearchAnim) return;
startSearchAnim();
$searchWrap.addClass('on');
stopSearchAnim(function(){
$('.search-form-input').focus();
});
});
$('.search-form-input').on('blur', function(){
startSearchAnim();
$searchWrap.removeClass('on');
stopSearchAnim();
});
// Share
$('body').on('click', function(){
$('.article-share-box.on').removeClass('on');
}).on('click', '.article-share-link', function(e){
e.stopPropagation();
var $this = $(this),
url = $this.attr('data-url'),
encodedUrl = encodeURIComponent(url),
id = 'article-share-box-' + $this.attr('data-id'),
offset = $this.offset();
if ($('#' + id).length){
var box = $('#' + id);
if (box.hasClass('on')){
box.removeClass('on');
return;
}
} else {
var html = [
'<div id="' + id + '" class="article-share-box">',
'<input class="article-share-input" value="' + url + '">',
'<div class="article-share-links">',
'<a href="https://twitter.com/intent/tweet?url=' + encodedUrl + '" class="article-share-twitter" target="_blank" title="Twitter"></a>',
'<a href="https://www.facebook.com/sharer.php?u=' + encodedUrl + '" class="article-share-facebook" target="_blank" title="Facebook"></a>',
'<a href="http://pinterest.com/pin/create/button/?url=' + encodedUrl + '" class="article-share-pinterest" target="_blank" title="Pinterest"></a>',
'<a href="https://plus.google.com/share?url=' + encodedUrl + '" class="article-share-google" target="_blank" title="Google+"></a>',
'</div>',
'</div>'
].join('');
var box = $(html);
$('body').append(box);
}
$('.article-share-box.on').hide();
box.css({
top: offset.top + 25,
left: offset.left
}).addClass('on');
}).on('click', '.article-share-box', function(e){
e.stopPropagation();
}).on('click', '.article-share-box-input', function(){
$(this).select();
}).on('click', '.article-share-box-link', function(e){
e.preventDefault();
e.stopPropagation();
window.open(this.href, 'article-share-box-window-' + Date.now(), 'width=500,height=450');
});
// Caption
$('.article-entry').each(function(i){
$(this).find('img').each(function(){
if ($(this).parent().hasClass('fancybox')) return;
var alt = this.alt;
if (alt) $(this).after('<span class="caption">' + alt + '</span>');
$(this).wrap('<a href="' + this.src + '" title="' + alt + '" class="fancybox"></a>');
});
$(this).find('.fancybox').each(function(){
$(this).attr('rel', 'article' + i);
});
});
if ($.fancybox){
$('.fancybox').fancybox();
}
// Mobile nav
var $container = $('#container'),
isMobileNavAnim = false,
mobileNavAnimDuration = 200;
var startMobileNavAnim = function(){
isMobileNavAnim = true;
};
var stopMobileNavAnim = function(){
setTimeout(function(){
isMobileNavAnim = false;
}, mobileNavAnimDuration);
}
$('#main-nav-toggle').on('click', function(){
if (isMobileNavAnim) return;
startMobileNavAnim();
$container.toggleClass('mobile-nav-on');
stopMobileNavAnim();
});
$('#wrap').on('click', function(){
if (isMobileNavAnim || !$container.hasClass('mobile-nav-on')) return;
$container.removeClass('mobile-nav-on');
});
})(jQuery); | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
#!/usr/bin/env bash
webpack --config 03.alias.noparse.config.js | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
#!/usr/bin/env bash
webpack --entry ./entry.js --output-path dist --output-file bundle.js | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
/**
* Created by yan on 15-7-6.
*/
module.exports = {
entry: "./entry.js",
output: {
path: "dist",
filename: "bundle.js"
},
profile: true,
stats: {
reasons: true,
exclude:[],
modules:true,
colors: true,
},
resolve: {
alias: {
moment: "moment/min/moment-with-locales.min.js"
}
}
} | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>Moment Demo</title>
<!--
<script src="//apps.bdimg.com/libs/moment/2.8.3/moment-with-locales.min.js"></script>
-->
</head>
<body>
<h5>当前时间:</h5>
<script src="dist/bundle.js"></script>
</body>
</html> | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
#!/usr/bin/env bash
webpack --config 02.alias.config.js | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
/**
* Created by yan on 15-7-6.
*/
module.exports = {
entry: "./entry.js",
output: {
path: "dist",
filename: "bundle.js"
},
profile: true,
stats: {
reasons: true,
exclude: [],
modules: true,
colors: true,
},
resolve: {
alias: {
moment: "moment/min/moment-with-locales.min.js"
}
},
module: {
noParse: [/moment-with-locales/]
}
} | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
#!/usr/bin/env bash
webpack --config 04.externals.config.js --display-modules | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
#!/usr/bin/env bash
webpack --entry ./entry.js --output-path dist --output-file bundle.js \
--colors \
--profile \
--display-modules | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
/**
* Created by yan on 15-7-6.
*/
var moment = require('moment');
document.write(moment().locale('zh-cn').format('LLLL')); | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
/**
* Created by yan on 15-7-6.
*/
module.exports = {
entry: "./entry.js",
output: {
path: "dist",
filename: "bundle.js"
},
profile: true,
stats: {
reasons: true,
exclude: [],
modules: true,
colors: true,
},
externals: {
moment: "var moment"
}
} | {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
---
title: {{ title }}
date: {{ date }}
tags:
permalink: {{ title }}
---
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
---
title: {{ title }}
date: {{ date }}
---
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
---
title: {{ title }}
tags:
---
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
webpack-performance.com
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
---
title: 压缩 JS
date: 2016-02-24 13:55:49
tags:
---
大家新年好 ^^,这是 [Webpack 性能优化](https://github.com/wyvernnot/webpack_performance) 系列文章的第二篇。
在这篇里我们来通过一个实际的例子来看看如何在 Webpack 打包的时候启用压缩。
<!-- more -->
这个例子是由 Github 网友 `@zjy01` 提供的: [react_and_redux_and_router_example](https://github.com/zjy01/react_and_redux_and_router_example)
**在不做任何更改的情况下**
```sh
webpack --config webpack.static.config.js
```
结果:
```txt
Time: 1726ms
Asset Size Chunks Chunk Names
bundle.js 949 kB 0, 1 [emitted] bundle
common.js 3.55 kB 1 [emitted] common.js
+ 257 hidden modules
```
输出文件加起来将近 1 MB。
打开 `bundle.js`,发现所有的换行和注释都保留着,所有的变量名都原汁原味,这些问题很容易通过 `uglify` 来解决。
但是由于 `uglify` 以后代码可读性就会大大降低,这样就不容易发现隐藏的其它问题,所以我们先不急着 `uglify` 而是先看看生成的代码。
不难发现,为了调试的需要,React 发布在 NPM 上的源码里有很多地方检测了当前环境。
```js
if (process.env.NODE_ENV !== 'production') {
// 如果不是产品环境就怎样怎样
}
```
## 使用 DefinePlugin 消除环境监测的代码
通过编辑 webpack 的配置文件,加上 DefinePlugin,把 process.env.NODE_ENV 替换掉
```js
{
plugins:[
...
new webpack.DefinePlugin({
'process.env': {
'NODE_ENV': JSON.stringify(process.env.NODE_ENV)
}
})
]
}
```
再次执行
```sh
NODE_ENV=production webpack --config webpack.static.config.js
```
结果:
```txt
Time: 1859ms
Asset Size Chunks Chunk Names
bundle.js 932 kB 0, 1 [emitted] bundle
common.js 3.55 kB 1 [emitted] common.js
+ 256 hidden modules
```
仅仅减小了 16 kB左右,这是因为 DefinePlugin 只会做简单的替换,之前有关环境检测的代码替换后如下:
```js
if (false) {
// 如果不是产品环境就怎样怎样
}
```
实际上 if 块里的代码已经变成了 `dead code` ,即死区,永远都不会被执行到。而清除代码死区正是 `uglifyjs` 非常擅长的地方。
## 使用 uglifyjs 压缩代码
在前端打包的流程中,`uglify` 操作是如此的常见以至于被内置进了 `webpack` 里,使用的时候加上 `--optimize-minimize` 参数即可。
```sh
NODE_ENV=production webpack --config webpack.static.config.js --optimize-minimize
```
结果:
```txt
Time: 4059ms
Asset Size Chunks Chunk Names
bundle.js 223 kB 0, 1 [emitted] bundle
common.js 735 bytes 1 [emitted] common.js
+ 252 hidden modules
```
## 关于
webpack 版本 1.12.14
## 总结
通过这篇文章,简单介绍了如何在 Webpack 打包的时候启用压缩,重点在于消除环境相关的代码。
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
---
title: 合并 Babel 助手方法
date: 2016-05-16 17:51:35
tags:
---
`Babel` 在转换一个文件的时候会加上一些助手方法,这些助手方法会完成诸如创建类,检查类构造函数调用等功能。
其实就是用 `ES5` 来实现 `ES6` 相关特性的代码。
这些代码如果每个文件生成的时候都带上,必然会增加项目打包结果的整体大小。
因此 `Babel` 项目单独抽出了一个模块叫做 `babel-runtime`。用于存放公共助手方法。
<!-- more -->
[具体的介绍可以看这个链接](https://github.com/thejameskyle/babel-handbook/blob/master/translations/zh-Hans/user-handbook.md#babel-runtime)
## 启用前后的差别
**引入 `BabelRuntime` 前**
2,915,331 bytes
**引入 `BabelRuntime` 后**
2,992,866 bytes
减少了 77 KB
## 开启 Gzip 后,效果就不那么明显了
**引入 `babel-runtime` 前,`Gzip` 压缩结果**
808,753 bytes
**引入 `babel-runtime` 后,`Gzip` 压缩结果**
803,013 bytes
只减少了 5 kb,可见 `Gzip` 在压缩字符串的时候还是很给力的。
## 其它技术细节
除了合并 Babel 助手方法, `babel-runtime` 还有其他两个作用
- 使用 `generator/sync` 的时候自动加载 `babel-runtime/regenerator` 依赖
- 使用 `Promise` 和 `Object.assign` 的时候自动加载 `babel-runtime/core-js`
[原文](http://babeljs.io/docs/plugins/transform-runtime/#technical-details)
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
---
title: 使用别名做重定向
date: 2015-07-06 17:47:55
tags:
permalink: alias
---
Webpack 是 OneAPM 前端技术栈中很重要的一部分,它非常好用,如果你还不了解它,建议你阅读这篇 [Webpack 入门指迷](http://segmentfault.com/a/1190000002551952)
,在 OneAPM 我们用它完成静态资源打包,ES6 代码的转换 ,React 组件的组织等,在接下来的日子里,我们将通过一系列文章和业界分享我们在使用 Webpack 过程中关于性能方面的经验。
<!-- more -->
作为系列文章的第一篇,我们会重点介绍 Webpack 中的 `resolve.alias` ,也就是请求重定向。不过请注意 Webpack 里的请求是对模块的依赖,也就是一个 `require` 语句,而不是一个 HTTP 请求。
**必要的准备**
- 需要你有一定的 Node.js 基础
- 电脑上装有最新版的 Webpack (`npm install webpack -g`)
- 了解 Webpack 配置文件的格式
**例子:本地时钟**
要实现的功能很简单,就是在页面上用中文显示当前时间,需要用到 [`moment`](http://momentjs.com/) 这个库,这个库封装了很多和日期相关的函数,而且自带了国际化的支持。
### 新建一个 Node.js 项目
使用 `npm init` 初始化你的项目,然后通过 `npm install moment -D` 加上 `moment` 的开发者依赖。
新建一个 `entry.js` 作为入口文件,当然你也可以用 `app.js` 这样的名字,只是大部分的 Webpack 示例都是用的是 `entry.js`。
```js
var moment = require('moment');
document.write(moment().locale('zh-cn').format('LLLL'));
```
新建一个页面 `index.html`, 引用 `bundle.js`:
```html
<body>
<h5>当前时间:</h5>
<script src="dist/bundle.js"></script>
</body>
```
此时的文件目录看起来是这样的:
```text
index.html
package.json
entry.js
node_modules/moment
```
到目前为止 `bundle.js` 这个文件还不存在,不过别着急,接下来的工作就交给 Webpack 来完成。
```text
index.html ------------------------+
package.json |
+--> <Clock App>
entry.js --------+ |
+-->bundle.js+--+
node_modules/moment-+
```
如图,Webpack 会把 `entry.js` 和 `moment` 模块一起打包成一个 bundle.js 文件,和 `index.html` 一起构成了我们的 Clock App。怎么样,是不是已经听到 Clock App 滴答作响了?
### 使用 webpack 打包代码
在命令行执行:
```sh
webpack --entry ./entry.js --output-path dist --output-file bundle.js
```
你会看到类似下面的输出结果:
```
Hash: bf9007fb1e0cb30e3ef7
Version: webpack 1.10.0
Time: 650ms
Asset Size Chunks Chunk Names
bundle.js 378 kB 0 [emitted] null
[0] ./entry.js 125 bytes {0} [built]
+ 86 hidden modules
```
可以看到,耗时 650ms,这么慢着实让人意外,一定要想办法提高“新一代神器”速度;另一方面,最后一行的 **+ 86 hidden modules** 非常让人怀疑:明明是一个简单的 Clock App,怎么会有这么多的依赖。
## 如何快速定位 Webpack 速度慢的原因
再一次,在命令行输入:
```sh
webpack --entry ./entry.js --output-path dist --output-file bundle.js \
--colors \
--profile \
--display-modules
```
不过这次新增加了三个参数,这三个参数的含义分别是:
- `--colors` 输出结果带彩色,比如:会用红色显示耗时较长的步骤
- `--profile` 输出性能数据,可以看到每一步的耗时
- `--display-modules` 默认情况下 `node_modules` 下的模块会被隐藏,加上这个参数可以显示这些被隐藏的模块
这次命令行的结果已经很有参考价值,可以帮助我们定位耗时比较长的步骤
```
Hash: bf9007fb1e0cb30e3ef7
Version: webpack 1.10.0
Time: 650ms
Asset Size Chunks Chunk Names
bundle.js 378 kB 0 [emitted] null
[0] ./entry.js 125 bytes {0} [built]
factory:11ms building:8ms = 19ms
[1] ../~/moment/moment.js 102 kB {0} [built]
[0] 19ms -> factory:7ms building:141ms = 167ms
[2] (webpack)/buildin/module.js 251 bytes {0} [built]
[0] 19ms -> [1] 148ms -> factory:132ms building:159ms = 458ms
[3] ../~/moment/locale ^\.\/.*$ 2.01 kB {0} [optional] [built]
[0] 19ms -> [1] 148ms -> factory:6ms building:10ms dependencies:113ms = 296ms
[4] ../~/moment/locale/af.js 2.57 kB {0} [optional] [built]
[0] 19ms -> [1] 148ms -> [3] 16ms -> factory:52ms building:65ms dependencies:138ms = 438ms
..... 广告分割线,Node.js 工程师简历请发 [email protected] ......
[85] ../~/moment/locale/zh-cn.js 4.31 kB {0} [optional] [built]
[0] 22ms -> [1] 162ms -> [3] 18ms -> factory:125ms building:145ms dependencies:22ms = 494ms
[86] ../~/moment/locale/zh-tw.js 3.07 kB {0} [optional] [built]
[0] 22ms -> [1] 162ms -> [3] 18ms -> factory:126ms building:146ms dependencies:21ms = 495ms
```
从命令行的结果里可以看到从 Request[4] 到 Request[86] 都是在解析 `moment.js` 附带的大量本地化文件。所以我们遇到的速度慢的问题其实是由 `moment` 引起的。
如果你想知道为什么 Webpack 会加载这么多的模块,可以参考这篇文章 [ Why Enormous Locales During Webpack MomentJS](https://github.com/wyvernnot/webpack_performance/tree/master/moment-example/WHY_LOCALES.md)
我们再来看看 `entry.js` 代码的第一行,标准的 `CommonJS` 写法:
```js
var moment = require('moment');
```
也就是说,请求的是 `moment` 的源码。实际上,通过 NPM 安装 `moment` 的时候会同时安装 `moment` 的源码和压缩后的代码,试验证明下面这种写法也是可行的:
```js
var moment = require('moment/min/moment-with-locales.min.js');
```
只不过这样改,可读性会有所下降,而且每一个用到 `moment` 的地方都得这么写。另外,如果同样的问题出现在第三方模块中,修改别人代码就不那么方便了。下面来看看用 Webpack 怎么解决这个问题。
### 在 Webpack 中使用别名
别名(`resolve.alias`) 是 Webpack 的一个配置项,它的作用是把用户的一个请求重定向到另一个路径,例如通过修改 `webpack.config.js` 配置文件,加入:
```
resolve: {
alias: {
moment: "moment/min/moment-with-locales.min.js"
}
}
```
这样待打包的脚本中的 `require('moment');` 其实就等价于 `require('moment/min/moment-with-locales.min.js');` 。通过别名的使用在本例中可以减少几乎一半的时间。
```
Hash: cdea65709b783ee0741a
Version: webpack 1.10.0
Time: 320ms
Asset Size Chunks Chunk Names
bundle.js 148 kB 0 [emitted] main
[0] ./entry.js 125 bytes {0} [built]
factory:11ms building:9ms = 20ms
[1] ../~/moment/min/moment-with-locales.min.js 146 kB {0} [built] [1 warning]
[0] 20ms -> factory:8ms building:263ms = 291ms
[2] (webpack)/buildin/module.js 251 bytes {0} [built]
[0] 20ms -> [1] 271ms -> factory:3ms building:1ms = 295ms
WARNING in ../~/moment/min/moment-with-locales.min.js
Module not found: Error: Cannot resolve 'file' or 'directory' ./locale in */webpack_performance/node_modules/moment/min
@ ../~/moment/min/moment-with-locales.min.js 1:2731-2753
```
### 在 Webpack 中忽略对已知文件的解析
`module.noParse` 是 `webpack` 的另一个很有用的配置项,如果你 **确定一个模块中没有其它新的依赖** 就可以配置这项,`webpack` 将不再扫描这个文件中的依赖。
```
module: {
noParse: [/moment-with-locales/]
}
```
这样修改,再结合前面重命名的例子,更新后的流程是:
- `webpack` 检查到 `entry.js` 文件对 `moment` 的请求;
- 请求被 `alias` 重定向,转而请求 `moment/min/moment-with-locales.min.js`;
- `noParse` 规则中的 `/moment-with-locales/` 一条生效,所以 `webpack` 就直接把依赖打包进了 `bundle.js` 。
```
Hash: 907880ed7638b4ed70b9
Version: webpack 1.10.0
Time: 76ms
Asset Size Chunks Chunk Names
bundle.js 147 kB 0 [emitted] main
[0] ./entry.js 125 bytes {0} [built]
factory:13ms building:13ms = 26ms
[1] ../~/moment/min/moment-with-locales.min.js 146 kB {0} [built]
[0] 26ms -> factory:13ms building:5ms = 44ms
```
时间进一步被压缩,只需要 76ms,比前一步还减少了 75%。
### 在 Webpack 中使用公用 CDN
Webpack 是如此的强大,用其打包的脚本可以运行在多种环境下,Web 环境只是其默认的一种,也是最常用的一种。考虑到 Web 上有很多的公用 CDN 服务,那么
怎么将 Webpack 和公用的 CDN 结合使用呢?方法是使用 `externals` 声明一个外部依赖。
```
externals: {
moment: true
}
```
当然了 HTML 代码里需要加上一行
```html
<script src="//apps.bdimg.com/libs/moment/2.8.3/moment-with-locales.min.js"></script>
```
这次打包,结果只用了 49 ms,几乎达到了极限。
## 总结
本文结合本地时钟的例子,展示了定位 Webpack 性能问题的步骤,以及所需要的两个参数 :`--display-modules` 和 `--profile`。然后,重点介绍了 `resolve.alias`
即利用别名做重定向的方法和场景,在此基础上,配合 `module.noParse` 忽略某些模块的解析可以进一步加快速度。最后介绍了用 `externals` 定义外部依赖方法来使用公用 CDN。
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
---
title: Webpack 关键指标监控
date: 2016-04-25 14:13:05
tags:
---
`吃自己的狗食` 是一个很有趣的文化。意思大致就是鼓励 IT 企业要使用自己的产品。比如淘宝每次发布新的版本前都会在
公司内部做一个测试。通过 `吃自己的狗食` 可以及早的发现程序中的问题。
<!-- more -->
### 背景介绍
CloudInsight 是 OneAPM 在 2016 年初正式发布的一款性能监控的产品。它的前端采用了 React 来编写。
并使用 Webpack 来打包。每次前端发版的时候必须在程序员的电脑上 check out 最新代码,然后运行一些列的脚本。
在经历了两次加班到九点以后,我们觉得很有必要把打包的过程自动化。
## 数据采集
无论是 Webpack, Grunt 还是 Gulp, 它们都有一个很显著的特点,就是极易于扩展。对这样的工具来说,开发插件的简易程度
有的时候直接决定了这套工具能获得多么广泛的生态系统。
因此,要取得 Webpack 打包过程中的指标可以优先考虑使用插件的方式。
## 编写 Webpack 插件
Webpack 官网上有一篇详细的文章指导开发者如何编写 Webpack 插件
http://webpack.github.io/docs/how-to-write-a-plugin.html
摘录 HelloWorld 插件的代码如下:
```js
function HelloWorldPlugin(options) {
// Setup the plugin instance with options...
}
HelloWorldPlugin.prototype.apply = function(compiler) {
compiler.plugin('done', function() {
console.log('Hello World!');
});
};
module.exports = HelloWorldPlugin;
```
只需要实现 apply 方法即可。在 apply 方法中可以监听 Webpack 的各种事件。
|事件名|描述|
|------|-----|
|done| 完成 |
### 选择时间点
Compiler 有点像一个 EventEmitter。打包完成的时候会触发一个 done 事件,我们只要监听这个事件就可以。
```js
compiler.plugin('done', function (compilation) {
});
```
回调的第一个参数是 compilation ,包含了这次打包几乎所有的信息。
例如要获得打包过程中的所有警告的个数:
```js
compilation.toJson().warnings.length
```
这样我们就得到了一个指标:
```txt
webpack.warnings.count
```
那么哪些是我们需要重点关注的指标呢
## 定义指标
| 指标 | 介绍 |
|------|------|
|webpack.asset.kb_size|单个输出文件的大小|
|webpack.assets.count|输出文件的个数|
|webpack.assets.sum.kb_size|输出文件的合计大小|
|webpack.chunks.count|分块总计|
|webpack.errors.count|错误个数|
|webpack.warnings.count|警告个数|
|webpack.modules.count|模块个数|
|webpack.time.ms|构建时间|
## 标签系统
`avg:webpack.asset.kb_size {name=main.js}`
`avg:webpack.asset.kb_size`
|-------|-------|
|builder|打包的机器|
|env |环境 |
## 数据展现
## 自定义参数
## 生成报表
## 处理 stats.js
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
---
title: 基于 Docker 搭建 Node.js + Jenkins 环境
permalink: nodejs_in_jenkins_on_docker
date: 2016-08-29 13:41:47
tags: jenkins
---
要实现 `Webpack` 项目的持续集成和持续部署需要使用 `Jenkins` 这一工具。通过本文,你可以了解到怎样在 `Docker` 里运行 `Jenkins` 最新的 `2.x` 版本和 `Jenkins Slave`,并基于此搭建一个多版本、可伸缩的 `Node.js` 执行环境。
<!-- more -->
# 准备工作
- 一个稳定的 `Docker` 环境,一点点 `Docker` 的基础知识
- 了解 `Jenkins` 在 `持续集成/持续部署` 实践中的作用
# 启动 Jenkins 容器
```sh
docker run -d -p 8080:8080 --name jenkins jenkins:2.7.2
```
**下载速度慢别着急**
如果你在国内,一定会遇到网速不给力的情况。比如安装 `Docker Engine`,或者下载镜像的时候,总是卡的要死甚至有的时候下载链接被重置。这个时候可以选择一个国内的 Docker 加速器。
## 配置持久化
可以在执行 `docker run` 的时候增加一个 `-v` 参数:
```
docker run -d -p 8080:8080 -v /your/home:/var/jenkins_home --name jenkins jenkins:2.7.2
```
如果只是简单的实验,在启动 `Jenkins` 的时候不用指定 `Volume`,但如果是产品环境,一定要指定一个 `Volume` 来实现持久化。只有这样用户列表,项目设置,安装的插件等设置才会被保留。
## 启动成功
用浏览器打开 `http://localhost:8080`,看到的是 `Jenkins` 安装初始化的页面。

会提示输入 `admin` 帐号的密码,这个密码是在 `Jenkins` 初次启动的时候随机生成的,并一直保存在容器里。
可以通过下面的命令查看 `admin` 的密码 (即查看容器里某个文件的内容)
```
docker exec jenkins cat /var/jenkins_home/secrets/initialAdminPassword
```
登录进去后需要选择初始化安装下载的插件,一般安装默认的插件列表即可。
下一步,`Jenkins` 会提示你创建一个除了 admin 之外的管理员用户,可建可不建。

看到这个页面,就说明 Jenkins 安装成功了

# 添加 Slave 节点
## 为什么使用 Slave
在我们团队使用 `Jenkins` 的过程中就遇到过这样的一件事:某个团队成员在 `Jenkins` 所在的系统下装了一个很彪悍的系统软件,把 `Home` 目录给整个加密了,结果 `Jenkins` 上的构建纷纷失败。
这提示我们,持续集成的环境应当尽量保持独立,当多个用户共用同一个 `Jenkins Master` 节点的时候,很容易因为一个成员改变了机器配置而对另一个构建造成影响。
所以,能用 `Slave` 做的事情尽量用 `Slave` 去做, 何况 `Docker` 里创建一个 `Slave` 是非常容易的事情。
## 新建 Slave 节点
在 `系统管理` `管理节点` 页面,点击左边的 `新建节点`
节点名称为 `slave01`,点击 `OK` 后自动进入节点设置页面
配置标签为 `linux node` 中间有空格,启动方法保留默认的 `'Launch agent via Java Web Start'`, 然后保存
从 `节点列表` 页面进入刚新建好的 `slave01` 节点,这个时候节点还不可以用,处在一个等待链接的状态

如图 `-secret` 后面跟的一段随机的密码字符串很重要,因为下面一步只有 `secret` 和 `name` 都一致才能连接成功。
## 启动 Slave 容器,连接节点
```
docker run --link jenkins -d jenkinsci/jnlp-slave -url http://jenkins:8080 50adcde27357f607b4b22c929b42e764561a80e0dca64119e49b447aaed6e53f slave01
```
启动容器后刷新 `Jenkins` 的节点列表, 很快 `slave01` 节点就变成可用的啦。
# 配置 NodeJS Plugin
`Jenkins` 的环境里默认是不带 `Node.js` 的,我们可以通过安装一个叫做 `NodeJS Plugin` 插件来实现 `Node.js` 的自动安装。
## 安装 Node.JS 插件
在 `系统管理` `管理插件` `可选插件` 页面,在过滤输入框里输入 `NodeJS`

选中它并点击 `下载待重启后安装`,然后勾选 `安装完成后重启 Jenkins` 选项,等待插件安装完成 `Jenkins` 会自动重启。

## 配置 NodeJS 插件
在 `系统管理` `Global Tool Configuration` 页面,滚动到最下面的 `NodeJS 安装`

按照图示新建 `v6.4.0` 的版本,勾选 `自动安装` 选项,并在压缩包 URL 里填入
```
http://npm.taobao.org/mirrors/node/v6.4.0/node-v6.4.0-linux-x64.tar.gz
```
这是目前国内最快最稳定的 NodeJS 下载源了,谢谢马云爸爸!
## 为什么使用 NodeJS Plugin 来安装 Node.js
有这样几个好处:
- 和 `Jenkins` 集成得最好,新添加的 `Slave` 节点会自动安装 Node.js 依赖
- 避免了登录到 `Slave` 安装 Node.js 可能改变操作系统配置的问题
- 可以在不同的构建里使用不同的 Node.js 版本
# 新建 Pipeline 项目
项目名为 demo ,以 `Jenkins` `2.x` 版本为例,类型选择为 `pipeline`

### 配置 Jenkinsfile
因为主要就是为了验证 `Node.js` 环境安装成功并且可用,所以 `Pipeline script` 只有两个 `Stage`

内容如下
```groovy
node ('node') {
stage '安装 Node'
tool name: 'v6.4.0', type: 'jenkins.plugins.nodejs.tools.NodeJSInstallation'
env.PATH = "${tool 'v6.4.0'}/node-v6.4.0-linux-x64/bin:${env.PATH}"
stage '验证 Node'
sh "node -v"
sh "npm -v"
}
```
其中
```
node ('node') {
```
上面这行表示选中具有 `node` 标签的节点。
```
tool name: 'v6.4.0', type: 'jenkins.plugins.nodejs.tools.NodeJSInstallation'
```
上面这行指明了构建过程会用到我们之前配置的 `Node.js` 工具的 `v6.4.0` 版本
```
env.PATH = "${tool 'v6.4.0'}/node-v6.4.0-linux-x64/bin:${env.PATH}"
```
上面这行会修改构建的 `PATH` 环境变量,否则会提示找不到 `node` 和 `npm` 命令
点击 `保存`,然后点击 `立即构建`,这样我们的 `Node.JS` 环境就搭建成功了

# 回顾
- 准备工作
- 启动 `Jenkins` 容器,以 `admin` 登录,并完成 `Jenkins` 的初始化设置
- 添加 `Slave` 节点,并连接 `Slave` 容器
- 安装和配置 `NodeJS Plugin` 管理多个版本的 `Node.js`
- 新建 `Pipeline` 项目,验证 `Node.js` 安装
| {
"repo_name": "longtian/webpack_performance",
"stars": "79",
"repo_language": "JavaScript",
"file_name": "2016-08-29-jenkins.md",
"mime_type": "text/plain"
} |
# Awesome Korean Newsletters [](https://awesome.re)
<!-- ALL-CONTRIBUTORS-BADGE:START - Do not remove or modify this section -->
[](#contributors-)
<!-- ALL-CONTRIBUTORS-BADGE:END -->
[](https://shields.io/)
📰 한국어로 발간되는 분야별 뉴스레터를 소개합니다.
> 가나다순으로 작성되어 있습니다.
> PC 화면에서 보시는 것을 권장드립니다.
## 개발
| 제목 | 주기 | 설명 | 발간인 | 미리보기 |
| :------------------------------- | :----- | :----------------------------------------------------- | :---------------------------------- | :---------------------- |
| [개발자스럽다][gaerae] | 월 1회 | 다양한 기술 정보를 찾아 <br /> 가치를 더해 공유 | [개래닷컴][gaerae_publ] | [🔗][gaerae_prvw] |
| [요즘IT][wishket] | 주 1회 | 매일 업데이트되는 <br /> 요즘 사람들의 IT 이야기 | [위시켓][wishket_publ] | [🔗][wishket_prvw] |
| [해킹짹짹][hacking] | 주 3회 | 해킹/보안 관련 재미있는 컨탠츠를 | [군자동 보안연구소][hacking_publ] | [🔗][hacking_prvw] |
| [Daily DevBlog][devblog] | 주 7회 | 개발관련 블로그를 수집하여 제공 | [Kwon Tae Kwan][devblog_publ] | [🔗][devblog_prvw] |
| [Dev Event][dev_event] | 주 1회 | 개발자 컨퍼런스 및 해커톤 일정 | [용감한 친구들][dev_event_publ] | [🔗][dev_event_prvw] |
| [FE News][fenews] | 월 1회 | FE 기술 소식 큐레이션 뉴스레터 | [Naver FE][fenews_publ] | [🔗][fenews_prvw] |
| [GeekNews][geek] | 비정기 | Geek 들을 위한 뉴스 서비스 | [Team Hada][geek_publ] | [🔗][geek_prvw] |
| [Korean FE Article][fearticle] | 비정기 | 영어로 작성된 프론트엔드 <br /> 아티클을 번역하고 공유 | [Korean FE Article][fearticle_publ] | [🔗][fearticle_prvw] |
| [Outsider's 기술 뉴스][outsider] | 격주 | 웹 개발 및 다양한 업계의 소식 | [Outsider][outsider_publ] | [🔗][outsider_prvw] |
| [TechBlogPosts][techblogposts] | 비정기 | 여러 IT 기술 블로그 포스트 | [정태훈][techblogposts_publ] | [🔗][techblogposts_prvw] |
| [WeeklyArxivTalk][arxivtalk] | 주 1회 | 한주간 새롭게 공개된 <br /> AI 연구 논문 공유 | [하정우][arxivtalk_publ] | [🔗][arxivtalk_prvw] |
[devblog]: http://daily-devblog.com/
[devblog_publ]: https://taetaetae.github.io/
[devblog_prvw]: http://daily-devblog.com/archive
[wishket]: https://yozm.wishket.com/magazine/
[wishket_publ]: https://www.wishket.com/
[wishket_prvw]: https://yozm.wishket.com/magazine/
[hacking]: https://page.stibee.com/subscriptions/130678/
[hacking_publ]: https://hackyboiz.github.io/about/
[hacking_prvw]: https://page.stibee.com/archives/130678
[fenews]: https://github.com/naver/fe-news
[fenews_publ]: https://github.com/naver/fe-news/tree/fe-org
[fenews_prvw]: https://github.com/naver/fe-news/blob/master/issues/2021-03.md
[geek]: https://news.hada.io/
[geek_publ]: https://hada.io/team
[geek_prvw]: https://news.hada.io/
[fearticle]: https://kofearticle.substack.com/subscribe
[fearticle_publ]: https://spicy-lace-142.notion.site/TEAM-205b50cfcf6147b489cad206aa951942
[fearticle_prvw]: https://kofearticle.substack.com/
[outsider]: https://blog.outsider.ne.kr/category/Newsletter
[outsider_publ]: https://twitter.com/outsideris
[outsider_prvw]: https://blog.outsider.ne.kr/1536?category=38
[techblogposts]: https://techblogposts.com/
[techblogposts_publ]: https://jthcast.dev/
[techblogposts_prvw]: https://techblogposts.com/
[gaerae]: https://blog.gaerae.com/
[gaerae_publ]: https://gaerae.com/
[gaerae_prvw]: https://blog.gaerae.com/search/label/newsletter
[arxivtalk]: https://github.com/jungwoo-ha/WeeklyArxivTalk
[arxivtalk_publ]: https://github.com/jungwoo-ha
[arxivtalk_prvw]: https://github.com/jungwoo-ha/WeeklyArxivTalk/issues/1
[dev_event]: https://github.com/brave-people/Dev-Event
[dev_event_publ]: https://github.com/brave-people
[dev_event_prvw]: https://github.com/brave-people/Dev-Event-Subscribe/issues
## 테크 / IT
| 제목 | 주기 | 설명 | 발간인 | 미리보기 |
| :------------------------ | :----- | :--------------------------------------------------------------- | :----------------------------- | :-------------------- |
| [놀리팝레터][knowllipop] | 주 1회 | 한 주간의 이슈와 IT기업의 핫한 소식 | [놀리팝][knowllipop_publ] | [🔗][knowllipop_prvw] |
| [미라클레터][miracle] | 주 3회 | 글로벌 테크, 실리콘밸리 소식 | [매경미디어][miracle_publ] | [🔗][miracle_prvw] |
| [뷰스레터][miilk] | 주 3회 | 세상 변화의 중심 <br /> 실리콘밸리의 생생한 인사이트 | [더밀크][miilk_publ] | [🔗][miilk_prvw] |
| [아웃스탠딩][outstanding] | 주 5회 | 어려운 IT이슈를 쉽고 재미있게 | [아웃스탠딩][outstanding_publ] | [🔗][outstanding_prvw] |
| [얼리어답터][early] | 주 3회 | 재미있는 세상 합리적으로 소비하기 | [글림퍼][early_publ] | [🔗][early_prvw] |
| [이바닥늬우스][ebadak] | 비정기 | 찰지고 신나는 테크바닥 늬우스 | [이바닥늬우스][ebadak_publ] | [🔗][ebadak_prvw] |
| [일분톡][ilbuntok] | 주 2회 | 세상 쉬운 테크 이야기 | [일분톡][ilbuntok_publ] | [🔗][ilbuntok_prvw] |
| [트렌트라이트][trendlite] | 주 1회 | 트렌트를 산뜻하게 즐기는 방법 | [기묘한][trendlite_publ] | [🔗][trendlite_prvw] |
| [BylineNetwork][byline] | 주 5회 | 전문기자들의 멀티채널네트워크 | [BylineNetwork][byline_publ] | [🔗][byline_prvw] |
| [Tech42][tech42] | 주 2회 | AI 기반 테크 저널리즘을 추구하는 <br /> 디지털 & 비즈니스 미디어 | [Tech42][tech42_publ] | |
| [techNeedle][needle] | 비정기 | 글로벌 테크 소식을 <br /> 인사이트와 함께 전합니다 | [techNeedle][tech42_publ] | [🔗][needle_prvw] |
| [Yumm-IT][yummit] | 월 1회 | IT 업계 핵심 트렌드부터 <br /> 꼭 알아야 하는 필수 상식까지 | [삼성SDS][yummit_publ] | [🔗][yummit_prvw] |
[knowllipop]: https://page.stibee.com/subscriptions/95801
[knowllipop_publ]: http://knowllipop.com/
[knowllipop_prvw]: https://page.stibee.com/archives/95801
[miracle]: https://page.stibee.com/subscriptions/33271
[miracle_publ]: https://m.mk.co.kr/intro/
[miracle_prvw]: https://mirakle.mk.co.kr/list.php?sc=51800017
[byline]: https://byline.network/newsletter/
[byline_publ]: https://byline.network/
[byline_prvw]: https://us18.campaign-archive.com/home/?u=bedb3ad13e513e25afa719b73&id=81db217913
[miilk]: https://docs.google.com/forms/d/e/1FAIpQLScOAY62JVZMdZ1GEEA6jbfqHKG8k3kiAtI4-brIBE-dBc1wiQ/viewform
[miilk_publ]: https://themiilk.com/
[miilk_prvw]: https://viewsletter.themiilk.com/
[outstanding]: https://outstanding.us1.list-manage.com/subscribe?u=58649932600b1a93ad942d0a7&id=546a6b6aba
[outstanding_publ]: https://outstanding.kr/info
[outstanding_prvw]: https://outstanding.kr/fomc20210323
[early]: http://www.earlyadopter.co.kr/
[early_publ]: http://www.earlyadopter.co.kr/
[early_prvw]: http://www.earlyadopter.co.kr/
[ilbuntok]: https://ilbuntok.com/
[ilbuntok_publ]: https://ilbuntok.com/
[ilbuntok_prvw]: https://us4.campaign-archive.com/home/?u=fac734f2470934a937f9d902c&id=0fd8d1e102
[trendlite]: https://page.stibee.com/subscriptions/41037
[trendlite_publ]: https://brunch.co.kr/@trendlite
[trendlite_prvw]: https://page.stibee.com/archives/41037
[needle]: https://techneedle.com/
[needle_publ]: https://techneedle.com/
[needle_prvw]: https://techneedle.com/
[tech42]: https://page.stibee.com/subscriptions/102868
[tech42_publ]: http://www.tech42.co.kr/
[ebadak]: https://ebadak.news/
[ebadak_publ]: https://ebadak.news/about/
[ebadak_prvw]: https://ebadak.news/2021/03/27/mistakes-and-memes/
[yummit]: https://page.stibee.com/subscriptions/118923
[yummit_publ]: https://www.instagram.com/samsung.sds/
[yummit_prvw]: https://page.stibee.com/archives/118923
## 경제 / 투자
| 제목 | 주기 | 설명 | 발간인 | 미리보기 |
| :---------------------------- | :----- | :----------------------------------------------------------------- | :------------------------------ | :-------------------- |
| [너겟레터][nugget] | 주 2회 | 너도 GET 할 수 있는 경제 소식 | [NUGGET][nugget_publ] | [🔗][nugget_prvw] |
| [돈 밝히는 여자 cathy][cathy] | 주 1회 | 세상에서 가장 쉬운 돈으로 회사 읽기 | [Cathy][cathy_publ] | [🔗][cathy_prvw] |
| [돈키레터][donkey] | 주 1회 | 돈 버는 열쇠를 알려주는 뉴스레터 | [효라클][donkey_publ] | [🔗][donkey_prvw] |
| [디스트리트][dstreet] | 주 2회 | 매일경제와 함께하는 블록체인 미디어 | [디스트리트][dstreet_publ] | [🔗][dstreet_prvw] |
| [디센터][decenter] | 주 1회 | 탈중앙화 시대를 여는 뉴스허브 | [디센터][decenter_publ] | |
| [리멤버 나우][remember] | 주 5회 | 그날의 경제 이슈를 설명해주는 레터 | [리멤버][remember_publ] | [🔗][remember_prvw] |
| [매부리레터][maeburi] | 주 1회 | 매일경제 부동산부 기자들이 만드는 <br /> 매일 보면 부자되는 이야기 | [매일경제][maeburi_publ] | [🔗][maeburi_prvw] |
| [머니네버슬립][moneynever] | 주 5회 | 미국주식에 대해 얼마나 잘 아시나요 | [머니네버슬립][moneynever_publ] | [🔗][moneynever_prvw] |
| [미래에셋 뉴스레터][mirae] | 주 1회 | 펀드/투자 관련 정보 | [미래에셋][mirae_publ] | |
| [순살브리핑][soonsal] | 주 5회 | 모건스탠리 홍콩 출신 2인의 <br/> 금융·경제 뉴스 살코기 | [순살][soonsal_publ] | [🔗][soonsal_prvw] |
| [씨로켓][crocket] | 비정기 | 콘텐츠와 플랫폼, 기술 변화 브리핑 | [씨로켓][crocket_publ] | [🔗][crocket_prvw] |
| [앤츠랩][ants] | 주 3회 | 건강한 주식 맛집 | [앤츠랩][ants_publ] | [🔗][ants_prvw] |
| [어피티][uppity] | 주 5회 | 사회초년생을 위한 <br/> 첫 번째 경제미디어 | [포브미디어][uppity_publ] | [🔗][uppity_prvw] |
| [위클리 호박너구리][raccoon] | 주 1회 | 취준생, 직장인을 위한 <br /> 종합 경제 뉴스레터 | [이재하][raccoon_publ] | [🔗][raccoon_prvw] |
| [이슈 한 캔][cider] | 주 2회 | 매주 다양한 경제 콘텐츠를 | [사이다경제][cider_publ] | [🔗][cider_prvw] |
| [인사이저][incizor] | 매일 | 전날의 시황을 한 눈에, <br/> AI기반 투자레터 | [인사이저][incizor_publ] | |
| [전종현의 HWBI][insight] | 주 1회 | 매주 비즈니스 인사이트를 전달 | [전종현][insight_publ] | [🔗][insight_prvw] |
| [카드고릴라][cardgorilla] | 주 1회 | 카드를 쓰는 이야기 | [카드고릴라][cardgorilla_publ] | [🔗][cardgorilla_prvw] |
| [커피팟][coffeepot] | 주 2회 | 쉽고 재밌는 해외 비즈 뉴스레터 | [커피팟][coffeepot_publ] | [🔗][coffeepot_prvw] |
| [코인데스크코리아][coindesk] | 주 6회 | 급격하게 변하는 블록체인 산업과 <br /> 암호화폐 시장의 흐름을 | [코인데스크][coindesk_publ] | [🔗][coindesk_prvw] |
| [티클레터][tickle] | 주 1회 | 놓칠 수 있는 글로벌 기업 이슈 | [티클][tickle_publ] | [🔗][tickle_prvw] |
| [팩플레터][factpl] | 주 3회 | 잘나가는 기업들이 궁금할 땐 | [팩플][factpl_publ] | [🔗][factpl_prvw] |
| [플래터][platter] | 주 2회 | 꼭 알아야 할 플랫폼 인사이트 | [platformworks][platter_publ] | [🔗][platter_prvw] |
| [BYTE][byte] | 주 5회 | 비즈니스 세상 5분 읽기 | [바이트][byte_publ] | [🔗][byte_prvw] |
| [Startup Weekly][startup] | 주 1회 | 스타트업 관련 소식과 정보를 한 눈에 | [Glance][startup_publ] | [🔗][startup_prvw] |
| [Two Cents][twocents] | 격주 | 테크, 스타트업, VC 분야의 <br/> 흐름에 대하여 | [허진호][twocents_publ] | [🔗][twocents_prvw] |
[cathy]: https://maily.so/cathyxcash
[cathy_publ]: https://nt.cathyxcash.com/About-Cathy-98cfb881f4ca4aa098039baf448b9314
[cathy_prvw]: https://maily.so/cathyxcash
[donkey]: http://donkeyletter.com/
[donkey_publ]: https://m.blog.naver.com/PostList.nhn?blogId=hyoracle
[donkey_prvw]: https://www.notion.so/DONKEY-LETTER-2aac05b885f34c4e9d31a37695476577
[decenter]: https://docs.google.com/forms/d/e/1FAIpQLSeyuIRpTwvunCDKiNRugBLM9PztJ-AZmmJe1KJ_thrAe7emDw/viewform
[decenter_publ]: https://www.decenter.kr/
<!-- [decenter] -->
[remember]: https://now.rememberapp.co.kr/
[remember_publ]: https://dramancompany.com/
[remember_prvw]: https://now.rememberapp.co.kr/
[moneynever]: https://page.stibee.com/subscriptions/106246
[moneynever_publ]: https://www.facebook.com/world.stock/
[moneynever_prvw]: https://page.stibee.com/archives/106246
[maeburi]: https://page.stibee.com/subscriptions/110950
[maeburi_publ]: https://www.mk.co.kr/premium/
[maeburi_prvw]: https://page.stibee.com/archives/110950
[mirae]: https://investments.miraeasset.com/webSeminar.do?id=20
[mirae_publ]: https://investments.miraeasset.com/index.do
<!-- [mirae_prvw]: -->
[soonsal]: https://page.stibee.com/subscriptions/51845
[soonsal_publ]: https://soonsal.com/about
[soonsal_prvw]: https://soonsal.com/
[crocket]: https://page.stibee.com/subscriptions/55500
[crocket_publ]: https://c-rocket.net/about/
[crocket_prvw]: https://page.stibee.com/archives/55500
[uppity]: https://uppity.co.kr/
[uppity_publ]: https://uppity.co.kr/
[uppity_prvw]: https://uppity.co.kr/list.html
[incizor]: https://incizor.com/Newsletter
[incizor_publ]: https://incizor.com/about-%EC%9D%B8%EC%82%AC%EC%9D%B4%EC%A0%80
<!-- [incizor_prvw]: -->
[startup]: http://glance.media/
[startup_publ]: https://ko-kr.facebook.com/startupweekly/
[startup_prvw]: http://glance.media/startupweekly/wyowxHlhEWvcglYlRz0LrQ/LpRWdyonpiD4sMjNwFLsEA/LFLiTWrsEbPgcMCDlcNe892g
[coffeepot]: https://page.stibee.com/subscriptions/52057
[coffeepot_publ]: https://coffeepot.me/
[coffeepot_prvw]: https://coffeepot.me/?q=YToxOntzOjEyOiJrZXl3b3JkX3R5cGUiO3M6MzoiYWxsIjt9&bmode=view&idx=6105425&t=board
[insight]: https://hyuni.substack.com/
[insight_publ]: http://hyuni.me/
[insight_prvw]: https://hyuni.substack.com/p/52
[twocents]: https://hur.substack.com/
[twocents_publ]: https://hur.medium.com/
[twocents_prvw]: https://hur.substack.com/p/two-cents-42-first-1000-gojek-calendly
[cardgorilla]: https://page.stibee.com/subscriptions/65530
[cardgorilla_publ]: https://www.card-gorilla.com/home
[cardgorilla_prvw]: https://www.card-gorilla.com/contents/detail/1532?utm_source=CGletter&utm_medium=form
[dstreet]: https://page.stibee.com/subscriptions/30830
[dstreet_publ]: https://dstreet.io/author/uthman/
[dstreet_prvw]: https://page.stibee.com/archives/30830
[coindesk]: https://page.stibee.com/subscriptions/88808?groupIds=65384
[coindesk_publ]: https://www.coindeskkorea.com/
[coindesk_prvw]: https://www.coindeskkorea.com/
[tickle]: https://letter.tickleinvest.com/
[tickle_publ]: https://tickleinvest.com/
[tickle_prvw]: https://letter.tickleinvest.com/letter_210429_main/
[factpl]: https://page.stibee.com/subscriptions/73985
[factpl_publ]: https://factpl.kr/
[factpl_prvw]: https://factpl.kr/news-letter
[platter]: https://platformworks.co.kr/subscribe
[platter_publ]: https://platformworks.co.kr/about
[platter_prvw]: https://platformworks.co.kr/letter
[raccoon]: https://pumpkin-raccoon.com/newsletter
[raccoon_publ]: https://www.linkedin.com/in/jaeha-lee/
[raccoon_prvw]: https://pumpkin-raccoon.com/newsletter
[nugget]: https://page.stibee.com/subscriptions/55973
[nugget_publ]: https://uget.co.kr/
[nugget_prvw]: https://uget.co.kr/?q=YToxOntzOjEyOiJrZXl3b3JkX3R5cGUiO3M6MzoiYWxsIjt9&bmode=view&idx=6588661&t=board
[byte]: http://mydailybyte.com/
[byte_publ]: http://mydailybyte.com/
[byte_prvw]: http://mydailybyte.com/
[ants]: https://maily.so/antslab
[ants_publ]: https://www.instagram.com/ants_lab/
[ants_prvw]: https://maily.so/antslab
[cider]: https://page.stibee.com/subscriptions/81187
[cider_publ]: https://www.cidermics.com/
[cider_prvw]: https://gallery.stibee.com/preview?id=630
## 시사
| 제목 | 주기 | 설명 | 발간인 | 미리보기 |
| :-------------------------- | :----- | :--------------------------------------------------------------- | :----------------------------- | :------------------ |
| [굿뉴스][goodnews] | 비정기 | 우리들 곁까지 전달되지 못하는 <br /> 세상의 좋은 뉴스 | [굿뉴스][goodnews_publ] | [🔗][goodnews_prvw] |
| [뉴닉][newneek] | 주 3회 | 우리가 시간이 없지, <br /> 세상이 안 궁금하냐 | [뉴닉][newneek_publ] | [🔗][newneek_prvw] |
| [뉴스페퍼민트][mint] | 비정기 | 화제가 된 외신을 소개 | [뉴스페퍼민트][mint_publ] | [🔗][mint_prvw] |
| [뉴웨이즈][newways] | 주 1회 | 말 통하는 젊치인을 만나고 싶다면 | [뉴웨이즈][newways_publ] | |
| [더슬랭][slang] | 주 3회 | 당신의 삶에 관련된 <br /> 다양한 사건과 정보들을 만나보세요! | [더슬랭][slang_publ] | [🔗][slang_prvw] |
| [델타 월딩][delta] | 주 3회 | 외교안보 전문 뉴스레터 | [델타 월딩][delta_publ] | [🔗][delta_prvw] |
| [똑똑][dokdok] | 주 4회 | 똑똑한 당신을 위한 <br/> 지식 큐레이션! | [똑똑][dokdok_publ] | [🔗][dokdok_prvw] |
| [마부뉴스][mabu] | 주 1회 | 데이터로 보는 뉴스의 맥락 | [SBS뉴스][mabu_publ] | [🔗][mabu_prvw] |
| [매콤달콤][macom] | 주 5회 | 매경이 전하는 세상의 지식 | [매일경제][macom_publ] | [🔗][macom_prvw] |
| [뭐라노][kookje] | 주 5회 | 짧고 굵게, 핵심만 정리 <br /> 뉴스 세줄 요약 | [국제신문][kookje_publ] | [🔗][kookje_prvw] |
| [미스터동][mrdong] | 주 3회 | 어디 가서 아는 척, <br /> 할 수 있는 정보 | [미스터동][mrdong_publ] | |
| [의사당 와이파이][assembly] | 주 1회 | 국회에서 이뤄지는 수많은 <br /> 일들 중 ICT 소식들만 꼽아서 정리 | [서진욱][assembly_publ] | [🔗][assembly_prvw] |
| [업클][upcle] | 주 5회 | 5분 만에 하루가 보입니다 | [(주)업클][upcle_publ] | [🔗][upcle_prvw] |
| [폴리티카][politika] | 주 1회 | 제대로 된 정치 시사 가이드 | [뉴트미디어][politika_publ] | [🔗][politika_prvw] |
| [피렌체의 식탁][firenzedt] | 주 1회 | 행정, 입법, 사법, 언론계의 <br /> 주요 인사 | [메디치미디어][firenzedt_publ] | [🔗][firenzedt_prvw] |
| [휘클리][hweekly] | 주 1회 | 10분 뉴스편지, 시사 뉴스레터 | [한겨레][hweekly_publ] | [🔗][hweekly_prvw] |
| [EFG][efg] | 주 1회 | 세상에 이런 문제도 있었어? | [EFG][efg_publ] | [🔗][efg_prvw] |
| [Issue Today][hankyung] | 주 5회 | 오늘 벌어질 이슈의 핵심을 | [한국경제][hankyung_publ] | [🔗][hankyung_prvw] |
| [H:730][h730] | 주 5회 | 당일 아침 한겨레신문의 주요뉴스를 | [한겨레][h730_publ] | [🔗][h730_prvw] |
[newneek]: https://newneek.co/
[newneek_publ]: https://newneek.co/
[newneek_prvw]: https://newneek.co/post/6EdJ8s
[mint]: https://newspeppermint.com/
[mint_publ]: https://newspeppermint.com/about/
[mint_prvw]: https://newspeppermint.com/2021/03/22/how-europe-became-the-worlds-biggest-electric-car-market/
[macom]: https://member.mk.co.kr/newsletter/info.php
[macom_publ]: https://www.mk.co.kr/
[macom_prvw]: https://member.mk.co.kr/newsletter/page/2021/0322/
[newways]: https://newways.kr/main/
[newways_publ]: https://newways.kr/about/
<!-- [newways_prvw]: -->
[slang]: https://theslang.co/
[slang_publ]: https://theslang.co/29
[slang_prvw]: https://theslang.co/27
[delta]: https://page.stibee.com/subscriptions/105380?groupIds=87768
[delta_publ]: https://www.instagram.com/delta.worlding/
[delta_prvw]: https://page.stibee.com/archives/105380
[dokdok]: https://www.dokdok.co/newsletter
[dokdok_publ]: https://www.dokdok.co/
[dokdok_prvw]: https://www.dokdok.co/newsletter
[mrdong]: https://mrdongnews.com/
[mrdong_publ]: https://mrdongnews.com/hello
<!-- [mrdong_prvw]: -->
[assembly]: https://page.stibee.com/subscriptions/105669
[assembly_publ]: https://the300.mt.co.kr/company/peopleView.html?no=199
[assembly_prvw]: https://brunch.co.kr/magazine/assemblywifi
[upcle]: https://page.stibee.com/subscriptions/68007
[upcle_publ]: https://upcle.me/
[upcle_prvw]: https://upcle.me/archives/category/newsletter
[h730]: https://page.stibee.com/subscriptions/70653
[h730_publ]: http://m.hani.co.kr/
[h730_prvw]: https://page.stibee.com/archives/70653
[politika]: https://politika.newt.news/
[politika_publ]: https://politika.newt.news/
[politika_prvw]: https://politika.newt.news/
[firenzedt]: https://page.stibee.com/subscriptions/93955
[firenzedt_publ]: https://firenzedt.com/
[firenzedt_prvw]: https://firenzedt.com/
[hweekly]: https://page.stibee.com/subscriptions/98338
[hweekly_publ]: http://m.hani.co.kr/
[hweekly_prvw]: https://page.stibee.com/archives/98338
[efg]: https://page.stibee.com/subscriptions/58675
[efg_publ]: https://efgvillage.com/
[efg_prvw]: https://page.stibee.com/archives/58675
[hankyung]: https://page.stibee.com/subscriptions/93883
[hankyung_publ]: https://www.hankyung.com/
[hankyung_prvw]: https://page.stibee.com/archives/93883
[kookje]: http://www.kookje.co.kr/contents/
[kookje_publ]: http://www.kookje.co.kr/
[kookje_prvw]: http://www.kookje.co.kr/contents/list.asp?clss_cd=320500
[mabu]: https://page.stibee.com/subscriptions/56136
[mabu_publ]: https://news.sbs.co.kr/news/newsPlusList.do?themeId=10000000114&plink=HEADER&cooper=MABU
[mabu_prvw]: https://news.sbs.co.kr/news/mabuList.do
[goodnews]: https://page.stibee.com/subscriptions/72991
[goodnews_publ]: https://www.instagram.com/goodnews.lab/
[goodnews_prvw]: https://page.stibee.com/archives/72991
## 문화 / 예술
| 제목 | 주기 | 설명 | 발간인 | 미리보기 |
| :----------------------------- | :----- | :---------------------------------------------------- | :------------------------------- | :---------------------- |
| [고독단][godok] | 주 1회 | 지금 당신의 인생에 도움이 되는 책 | [창비][godok_publ] | [🔗][godok_prvw] |
| [글로벌게임뉴스][game] | 주 1회 | 1주일간의 글로벌 게임 뉴스 | [UrsusVenatus][game_publ] | [🔗][game_prvw] |
| [글릿][glit] | 주 1회 | 클래식 음악 큐레이팅 서비스 | [글릿][glit_publ] | [🔗][glit_prvw] |
| [금요알람][alarm] | 주 2회 | 주말에 볼만한 영화 이야기와 짧은 에세이를 | [금요알람][alarm_publ] | [🔗][alarm_prvw] |
| [무무스트][moomo] | 주 1회 | 세상에 하나 뿐인 특별한 <br /> 음악을 당신의 이야기로 | [무궁무진][moomo_publ] | [🔗][moomo_prvw] |
| [문장줍기][munjang] | 주 1회 | 당신에게 보내는 반짝거리는 문장들 | [소얀][munjang_publ] | [🔗][munjang_prvw] |
| [반비 책타래][banbi] | 격주 | 책과 책을 잇는 편지 | [반비][banbi_publ] | [🔗][banbi_prvw] |
| [본느샹스][bonne] | 격주 | 좋은 책 추천받고 싶을 땐 | [본느샹스][bonne_publ] | [🔗][bonne_prvw] |
| [북저널리즘 톡스][book] | 주 1회 | 혁신가의 관점과 통찰, <br/> 에디터의 감각을 담아 | [스리체어스][book_publ] | [🔗][book_prvw] |
| [비디오쟈-키][jockey] | 주 1회 | 매주 영화와 드라마를 추천해드려요 | [비디오쟈키][jockey_publ] | [🔗][jockey_prvw] |
| [사적인 영화관][history_movie] | 월 2회 | 영화 속 굼금했던 <br/> 역사적 지식들을 모아 | [챙구][history_movie_publ] | [🔗][history_movie_prvw] |
| [수플레][playlist] | 주 1회 | 단 하나의 음악을 담은 <br/> 수요일의 플레이리스트 | [수플레][playlist_publ] | [🔗][playlist_prvw] |
| [에그브렉][eggbreak] | 격주 | 요즘 나오는 책 궁금할 땐 | [에그브렉][eggbreak_publ] | [🔗][eggbreak_prvw] |
| [영화로운][movie_hk] | 주 1회 | 영화 전문 기자가 전하는 <br/> 남다른 시네마 토크 | [한국일보][movie_hk_publ] | [🔗][movie_hk_prvw] |
| [영화 그리고 암전][darkness] | 주 1회 | 풍부한 영화 소식을 꼭꼭 담아 | [영그암][darkness_publ] | [🔗][darkness_prvw] |
| [인디즈 큐][indiespace] | 주 1회 | 관객기자단이 써내려간 <br /> 독립영화 소식 | [INDIESPACE][indiespace_publ] | [🔗][indiespace_prvw] |
| [찰리씨네 다이어리][charlie] | 주 1회 | 21세기 이전 영화를 소개 | [찰리][charlie_publ] | [🔗][charlie_prvw] |
| [책돌이편지][bookstone] | 주 1회 | 북스톤과 비컷 출판사의 이야기 | [북스톤][bookstone_publ] | [🔗][bookstone_prvw] |
| [콘샐러드][cornsalad] | 주 1회 | 금주의 OTT 시장 소식과 핫한 신작들 | [콘샐러드][cornsalad_publ] | [🔗][cornsalad_prvw] |
| [플롯레터][plot] | 주 2회 | 예술은 원래 쉽다 | [플롯][plot_publ] | [🔗][plot_prvw] |
| [한편의 편지][minumsa] | 주 1회 | 책보다 짧고 논문보다 쉬운 <br /> 한편의 인문학 | [민음사][minumsa_publ] | [🔗][minumsa_prvw] |
| [ANTIEGG][antiegg] | 주 2회 | 문화예술 큐레이션 플랫폼 | [ANTIEGG][antiegg_publ] | [🔗][antiegg_prvw] |
| [Acoustic Weekly][acoustic] | 주 1회 | 한 곡의 음악과 이야기 | [Acoustic Weekly][acoustic_publ] | [🔗][acoustic_prvw] |
| [stew!][stew] | 월 3회 | 맛있는 케이팝 뉴스레터 | [stew][stew_publ] | [🔗][stew_prvw] |
[godok]: https://page.stibee.com/subscriptions/61705
[godok_publ]: https://switch.changbi.com/
[godok_prvw]: https://www.notion.so/af6f68f10d5040789e7d9afa1d527855
[game]: https://maily.so/ursusvenatus
[game_publ]: https://maily.so/ursusvenatus
[game_prvw]: https://maily.so/ursusvenatus/posts/0b7763
[glit]: https://page.stibee.com/subscriptions/71156
[glit_publ]: https://www.glit.pw/aboutus
[glit_prvw]: https://www.glit.pw/
[alarm]: https://page.stibee.com/subscriptions/107946
[alarm_publ]: https://fridayalarm.tistory.com/
[alarm_prvw]: https://fridayalarm.tistory.com/
[moomo]: https://page.stibee.com/subscriptions/89655
[moomo_publ]: https://www.moomoost.com/
[moomo_prvw]: https://page.stibee.com/archives/89655
[munjang]: https://page.stibee.com/subscriptions/59924
[munjang_publ]: https://brunch.co.kr/@whaleyeon
[munjang_prvw]: https://page.stibee.com/archives/59924
[banbi]: https://page.stibee.com/subscriptions/80759
[banbi_publ]: http://banbi.minumsa.com/
[banbi_prvw]: https://page.stibee.com/archives/80759
[bonne]: https://page.stibee.com/subscriptions/117308
[bonne_publ]: https://www.notion.so/6b256f59e61b4f818f30baa9027b21dd
[bonne_prvw]: https://page.stibee.com/archives/117308
[book]: https://www.bookjournalism.com/talks
[book_publ]: https://www.bookjournalism.com/
[book_prvw]: https://www.bookjournalism.com/talks/2040
[jockey]: https://video-jockey.com/
[jockey_publ]: https://brunch.co.kr/@video-jockey
[jockey_prvw]: https://video-jockey.com/archive
[history_movie]: https://myhistoricalmovie.imweb.me/
[history_movie_publ]: https://m.blog.naver.com/auve4374/222795323749
[history_movie_prvw]: https://page.stibee.com/archives/149027
[playlist]: https://page.stibee.com/subscriptions/66675
[playlist_publ]: https://www.instagram.com/wed_playlist/
[playlist_prvw]: https://www.notion.so/ARCHIVE-eddd1868837544c7aa6bbdcbc02ae533
[eggbreak]: https://www.notion.so/Egg-Break-s-house-815443c0520541e1a775f0441db9bcfa
[eggbreak_publ]: https://www.instagram.com/egg_break/
[eggbreak_prvw]: https://page.stibee.com/archives/61665
[movie_hk]: https://www.hankookilbo.com/NewsLetter/movie
[movie_hk_publ]: https://www.hankookilbo.com/NewsLetter/movie
[movie_hk_prvw]: https://www.hankookilbo.com/NewsLetter/movie
[darkness]: https://page.stibee.com/subscriptions/84614
[darkness_publ]: https://www.instagram.com/film_and_darkness/
[darkness_prvw]: https://page.stibee.com/archives/84614
[indiespace]: https://indiespace.kr/notice/4975?fbclid=IwAR1ylkQChxvyCTvbbiNS34SqHXCh5o01iIN8UHLokbQAKWLpdIVoNrEDx-o
[indiespace_publ]: https://indiespace.kr/
[indiespace_prvw]: https://indiespace.tistory.com/4769
[charlie]: https://page.stibee.com/subscriptions/100765
[charlie_publ]: https://www.notion.so/0f4469805d2344129b6de4a1a1b8ac99
[charlie_prvw]: https://www.notion.so/0f4469805d2344129b6de4a1a1b8ac99
[bookstone]: https://www.book-stone.co.kr/subscribe
[bookstone_publ]: https://www.book-stone.co.kr/index
[bookstone_prvw]: https://www.book-stone.co.kr/letter
[cornsalad]: https://page.stibee.com/subscriptions/144429
[cornsalad_publ]: https://shorthaired-falcon-a8b.notion.site/2f8e7dbce5e145309b6270f1c0065904
[cornsalad_prvw]: https://page.stibee.com/archives/144429
[plot]: https://page.stibee.com/subscriptions/64956
[plot_publ]: https://playalot.imweb.me/
[plot_prvw]: https://www.notion.so/82ade6c8992b40b9911758cfca37deba
[minumsa]: https://minumsa.com/event/32747/
[minumsa_publ]: http://minumsa.com/
[minumsa_prvw]: http://minumsa.com/community/pubserially/?trm=228
[antiegg]: https://page.stibee.com/subscriptions/85471
[antiegg_publ]: https://antiegg.kr/ABOUT-US
[antiegg_prvw]: https://antiegg.kr/DAILY/view/2347232@8168040
[acoustic]: https://docs.google.com/forms/d/e/1FAIpQLSdiPBwYMmdA4YFRGeaYnesal09Lc37HSdA5GQ6-m2OA37ipQw/viewform
[acoustic_publ]: https://www.instagram.com/acoustic.weekly/
[acoustic_prvw]: https://drive.google.com/drive/folders/1F1xi9KGRiTwGiL8XSh_bWltki0CDjZIv
[stew]: https://page.stibee.com/subscriptions/167678
[stew_publ]: https://www.instagram.com/we.eat.stew/
[stew_prvw]: https://page.stibee.com/archives/167678
## 푸드
| 제목 | 주기 | 설명 | 발간인 | 미리보기 |
| :------------------------- | :----- | :------------------------------------------------------- | :------------------------------ | :---------------- |
| [냠냠편지][yamyam] | 격주 | 3인 3색 음식편지 | [냠냠편지][yamyam_publ] | [🔗][yamyam_prvw] |
| [뉴술레터][newsool] | 주 1회 | 수요일의 술맛나는 뉴스레터 | [뉴술레터][newsool_publ] | [🔗][newsool_prvw] |
| [미쉬울랭][mshl] | 주 1회 | 밀키트계의 미슐랭 가이드가 될거야 | [미쉬울랭][mshl_publ] | [🔗][mshl_prvw] |
| [빵슐랭가이드][breadguide] | 주 1회 | '빵 덕후' 현직 기자가 쓰는 <br /> 빵집 큐레이팅 뉴스레터 | [빵슐랭가이드][breadguide_publ] | |
| [WKD 와인레터][wicked] | 주 1회 | 3분만에 와인전문가 되는 법 | [위키드][wicked_publ] | [🔗][wicked_prvw] |
[yamyam]: https://page.stibee.com/subscriptions/76791
[yamyam_publ]: https://www.instagram.com/yamyamletter/
[yamyam_prvw]: https://www.notion.so/From-bc650d9c479e47a6a0050da969a10859
[newsool]: https://page.stibee.com/subscriptions/89686
[newsool_publ]: https://www.instagram.com/newsooletter/
[newsool_prvw]: https://page.stibee.com/archives/89686
[mshl]: https://page.stibee.com/subscriptions/100626
[mshl_publ]: https://www.instagram.com/mshl_guide/
[mshl_prvw]: https://page.stibee.com/archives/100626
[breadguide]: https://page.stibee.com/subscriptions/69711
[breadguide_publ]: https://breadguide.co.kr/
<!-- [breadguide_prvw]: -->
[wicked]: https://page.stibee.com/subscriptions/80149
[wicked_publ]: https://www.wkd-seoul.com/
[wicked_prvw]: https://www.wkd-seoul.com/letter
## 기타
| 제목 | 주기 | 설명 | 발간인 | 미리보기 |
| :-------------------------- | :----- | :-------------------------------------------------------------- | :---------------------------------- | :--------------------- |
| [까탈로그][theedit] | 주 1회 | 까탈스럽게 고른 취향 뉴스레터 | [디에디트][theedit_publ] | |
| [노티크][notique] | 주 1회 | 나에게 묻는, 나를 위한 질문 | [Notique][notique_publ] | [🔗][notique_prvw] |
| [당근레터][nomwoosa] | 격주 | 꼭 알아야 할 노동법 | [노무사][nomwoosa_publ] | [🔗][nomwoosa_prvw] |
| [당근메일][carrot] | 주 1회 | 생산성에 대한 <br/> 생각과 근육을 튼튼하게 | [당근메일][carrot_publ] | |
| [대학내일][univ] | 격주 | 밀레니얼-Z세대에 <br /> 관심 있는 분들을 위한 뉴스레터 | [대학내일][univ_publ] | [🔗][univ_prvw] |
| [두부레터][dubu] | 주 1회 | 내집마련 부린이를 위한 내집레터 | [베리빈][dubu_publ] | [🔗][dubu_prvw] |
| [디독][dedoc] | 주 1회 | 해외 디자인 아티클 번역 뉴스레터 | | |
| [레터비][bomapp] | 주 2회 | 보험 소식과 트렌드 | [보맵][bomapp_publ] | [🔗][bomapp_prvw] |
| [마티의 각주][mati] | 격주 | 편집진이 띄우는 마티의 책 이야기 | [도서출판 마티][mati_publ] | [🔗][mati_prvw] |
| [미리밋터][mrmt] | 주 1회 | 미리 만나는 뉴미디어 이야기 | [미리밋터][mrmt_publ] | [🔗][mrmt_prvw] |
| [밑미레터][meetme] | 주 1회 | '진짜 나'를 만나는 시간 | [(주)밑미][meetme_publ] | [🔗][meetme_prvw] |
| [부딩][booding] | 주 2회 | 부.알.못 밀레니얼을 위한 <br /> 부동산 뉴스레터 | [부딩][booding_publ] | [🔗][booding_prvw] |
| [베베레터][veve] | 주 1회 | 최신 베지테리언 뉴스 | [베리베지][veve_publ] | [🔗][veve_prvw] |
| [비마이펫][mypet] | 주 2회 | 반려동물 지식정보 채널 | [비마이펫][mypet_publ] | [🔗][mypet_prvw] |
| [서울라이터즈][seoul] | 주 1회 | 트렌드, 테크, 크리에이티브, <br /> 아이디어 발상을 위한 모든 것 | [서울라이터][seoul_publ] | [🔗][seoul_prvw] |
| [센드위치][sendy] | 주 1회 | 가장 쉬운 물류이야기 | [센디][sendy_publ] | [🔗][sendy_prvw] |
| [스여일삶][swik] | 주 1회 | 스타트업 여성들의 일과 삶 | [스윅][swik] | [🔗][swik_prvw] |
| [스요레터][stibee] | 주 1회 | 마케터와 크리에이터를 위한 <br/> 다양한 읽을거리 | [스티비][stibee_publ] | [🔗][stibee_prvw] |
| [쏠트-호][saltho] | 주 1회 | 꼭 알아두면 좋은 트렌드 소식 | [Designpress][saltho_publ] | [🔗][saltho_prvw] |
| [아하레터][aha] | 격주 | 자기계발부터 알면 이득인 정보까지 | [슈가슈가][aha_publ] | [🔗][aha_prvw] |
| [안녕.시골][sigol] | 주 1회 | 도시민을 위한 랜선 시골라이프 | [안녕시골][sigol_publ] | [🔗][sigol_prvw] |
| [어거스트][august] | 주 1회 | 지금을 읽고 싶은 사람들의 <br/> 미디어 이야기 | [어거스트][august_publ] | [🔗][august_prvw] |
| [어바웃우울][woowool] | 주 1회 | 우울하고 무기력한 <br /> 익명의 우울이들을 위한 공간 | [어바웃우울][woowool_publ] | [🔗][woowool_prvw] |
| [여름의 솜사탕][summer] | 주 1회 | 취향 가득 담은 <br /> 생활밀착형 뉴스레터 | [여름][summer_publ] | [🔗][summer_prvw] |
| [애피레터][animal] | 주 1회 | 한겨레가 만드는 동물뉴스 | [애니멀피플][animal_publ] | [🔗][animal_prvw] |
| [앨리스모먼트][alice] | 주 1회 | 함께 보면 재미있는 이슈 | [앨리스][alice_publ] | [🔗][alice_prvw] |
| [오늘의 귀짤][cute] | 주 1회 | 서로 갖고있는 귀여운 <br /> 사진과 이미지를 공유 | [귀짤단][cute_publ] | [🔗][cute_prvw] |
| [오렌지레터][orange] | 주 1회 | 소셜섹터 주요 행사와 이벤트, <br /> 펀딩, 채용, 모집, 공모사업 | [슬로워크][orange_publ] | [🔗][orange_prvw] |
| [오픈서베이][survey] | 격주 | 오픈서베이의 트렌드 <br /> 리포트를 보내드립니다 | [오픈서베이][survey_publ] | [🔗][survey_prvw] |
| [위클리어스][earth] | 주 1회 | 한 눈에 보는 주간 환경 이슈 | [서울환경운동연합][earth_publ] | [🔗][earth_prvw] |
| [작심4일][4days] | 주 1회 | 3일보다 딱 하루 더 해보고 <br /> 싶은 것에 집중하는 챌린지 | [사일이][4days_publ] | [🔗][4days_prvw] |
| [주간 쁘금][bgm] | 주 1회 | 당신의 영상에 필요한 <br /> 저작권 FREE 음악 | [셀바이뮤직][bgm_publ] | |
| [주말랭이][weekend] | 주 1회 | 이번 주말엔 뭐할랭~ | [주말랭이][weekend_publ] | [🔗][weekend_prvw] |
| [지구용][use4us] | 주 2회 | 지구가 걱정되지만 뭘 어떻게 <br /> 해야할지 막막한 당신을 위해 | [서울경제신문][use4us_publ] | [🔗][use4us_prvw] |
| [캐릿][careet] | 주 1회 | MZ 세대가 지금 가장 <br/>열광하고 있는 트렌드를 캐치 | [대학내일][careet_publ] | [🔗][careet_prvw] |
| [틈틈이][lostandfound] | 주 1회 | 좋으니까 나누고 싶은 마음으로, <br /> 취향 나눔 뉴스레터 | [로스트앤파운드][lostandfound_publ] | [🔗][lostandfound_prvw] |
| [퍼블리][publy] | 주 1회 | 생산성, 비즈니스에서부터 <br/> 영감과 자극까지 | [퍼블리][publy_publ] | |
| [프로젝트 썸원][someone] | 주 2회 | 읽었던 콘텐츠 중 <br/> 괜찮은 것들을 골라 | [윤성원][someone_publ] | [🔗][someone_prvw] |
| [해피와 귀여움 공장][happy] | 주 1회 | 공간, 물건, 음식, 예술 등 <br/> 다양한 주제의 귀여움을 | [해피][happy_publ] | [🔗][happy_prvw] |
| [혼자놀기대백과사전][alone] | 주 1회 | 1인 가구를 위한 정보 | [김유리][alone_publ] | [🔗][alone_prvw] |
| [BE.LETTER][bletter] | 주 1회 | 스티비 팀이 소개하는 <br /> 새로운 뉴스레터 | [스티비][bletter_publ] | [🔗][bletter_prvw] |
| [Fig. 1][fig1] | 격주 | 물건의 역사와 그 물건의 <br /> 영어 표현을 | [Fig. 1][fig1_publ] | [🔗][fig1_prvw] |
| [J의 편지][jletter] | 주 1회 | 취향 큐레이션 뉴스레터 | [김혜준][jletter_publ] | [🔗][jletter_prvw] |
| [Notion Wiki][notionw] | 월 1회 | 노션 팁, 노하우, 템플릿 | [노션한국사용자모임][notionw_publ] | [🔗][notionw_prvw] |
| [open.ads][open.ads] | 주 1회 | 당신의 성장을 돕는 <br /> 마케팅 큐레이션 플랫폼 | [오픈애즈][open.ads_publ] | [🔗][open.ads_prvw] |
| [Qletter][qletter] | 주 2회 | 마케터를 위한 아이디어 한 조각 | [아이보스][qletter_publ] | [🔗][qletter_prvw] |
| [SIDE][side] | 주 1회 | 해보고 싶은 게 너무 많아서 <br /> 고민인 사람들을 위한 뉴스레터 | [SIDE][side_publ] | [🔗][side_prvw] |
| [SPREAD by B][spread] | 주 1회 | 큐레이션한 브랜드 이야기를 전달 | [B][spread_publ] | [🔗][spread_publ] |
| [STONE][stone] | 주 1회 | 글로벌 브랜딩 트렌드와 <br /> 디자인, 마케팅, 비즈니스 전략 | [STONE][stone_publ] | [🔗][stone_publ] |
| [TMI.FM][tmi.fm] | 주 2회 | 크리에이티브 오너쉽을 위한 <br /> 텍스트 라디오 | [차우진][tmi.fm_publ] | [🔗][tmi.fm_prvw] |
| [weekly D][weeklyd] | 주 1회 | 매주 읽어볼 만한 <br /> 디자인 관련 글을 모아서 | [지현][weeklyd_publ] | [🔗][weeklyd_prvw] |
[theedit]: http://the-edit.co.kr/newsletter
[theedit_publ]: http://the-edit.co.kr/
<!-- [theedit_prvw]: -->
[notique]: https://mailchi.mp/notique/subscribe-brunch-shimdoobo
[notique_publ]: https://notique.co/
[notique_prvw]: https://notique.co/
[carrot]: http://carrotmail.kr/
[carrot_publ]: http://carrotmail.kr/?page_id=1649
<!-- [carrot_prvw]: -->
[univ]: https://page.stibee.com/subscriptions/28770
[univ_publ]: https://corp.univ.me/Home
[univ_prvw]: https://corp.univ.me/TrendLetter
[dubu]: https://page.stibee.com/subscriptions/98179?groupIds=73628
[dubu_publ]: https://brunch.co.kr/@ilbuntok#info
[dubu_prvw]: https://page.stibee.com/archives/98179
[dedoc]: https://page.stibee.com/subscriptions/31254
<!-- [dedoc_publ]: -->
<!-- [dedoc_prvw]: -->
[bomapp]: https://page.stibee.com/subscriptions/145758
[bomapp_publ]: https://www.bomapp.co.kr/
[bomapp_prvw]: https://page.stibee.com/archives/145758
[mati]: https://page.stibee.com/subscriptions/74783
[mati_publ]: http://matibooks.com/
[mati_prvw]: https://page.stibee.com/archives/74783
[mrmt]: http://mrmt.kr/
[mrmt_publ]: https://www.notion.so/e5da3d796980496cb64d09b84000f43b
[mrmt_prvw]: https://www.notion.so/e5da3d796980496cb64d09b84000f43b
[meetme]: https://nicetomeetme.kr/newsletter
[meetme_publ]: https://nicetomeetme.kr/
[meetme_prvw]: https://nicetomeetme.kr/newsletter
[veve]: https://page.stibee.com/subscriptions/58217
[veve_publ]: https://www.instagram.com/veryvezy/
[veve_prvw]: https://www.notion.so/6fc9c659969b466b95990668a8afaae7
[mypet]: https://mypetlife.co.kr/subscribe/
[mypet_publ]: https://mypetlife.co.kr/
[mypet_prvw]: https://us17.campaign-archive.com/home/?u=b41507f1f17cbe76293cde76c&id=5dae4e2094
[aha]: https://page.stibee.com/subscriptions/61765?groupIds=56635
[aha_publ]: https://aha-contents.tistory.com/19
[aha_prvw]: https://aha-contents.tistory.com/category/%EC%95%84%ED%95%98%EB%A0%88%ED%84%B0%20%EC%A7%80%EB%82%9C%20%ED%98%B8%20%EB%B3%B4%EA%B8%B0
[sendy]: https://page.stibee.com/subscriptions/73402
[sendy_publ]: https://sendy.ai/
[sendy_prvw]: https://page.stibee.com/archives/73402
[sigol]: https://page.stibee.com/subscriptions/74395
[sigol_publ]: https://www.instagram.com/hello.sigol/
[sigol_prvw]: https://www.notion.so/67afadbb27e54991a3f4ca8f21bf72fc
[august]: https://page.stibee.com/subscriptions/51479
[august_publ]: https://maily.so/august
[august_prvw]: https://maily.so/august/posts/352f94
[woowool]: https://page.stibee.com/subscriptions/97494
[woowool_publ]: https://brunch.co.kr/@aboutwoowool
[woowool_prvw]: https://page.stibee.com/archives/97494
[cute]: https://page.stibee.com/subscriptions/78423
[cute_publ]: https://www.notion.so/by-e30cb6e353e544a2a892e30057a2083e
[cute_prvw]: https://www.notion.so/by-e30cb6e353e544a2a892e30057a2083e
[orange]: https://slowalk.co.kr/orangeletter/
[orange_publ]: https://slowalk.co.kr/
[orange_prvw]: https://slowalk.co.kr/orangeletter/
[survey]: https://contents.opensurvey.co.kr/newsletter_subscribe.html
[survey_publ]: https://www.opensurvey.co.kr/
[survey_prvw]: https://blog.opensurvey.co.kr/
[side]: https://sideproject.co.kr/newsletter
[side_publ]: https://sideproject.co.kr/
[side_prvw]: https://sideproject.co.kr/newsletter
[swik]: https://page.stibee.com/subscriptions/39990
[swik_publ]: https://startupwomen.co.kr/home
[swik_prvw]: https://page.stibee.com/archives/39990
[summer]: https://mailchi.mp/9e0e525bc03b/summercandy/#mail
[summer_publ]: https://brunch.co.kr/@nerf-this
[summer_prvw]: https://mailchi.mp/9e0e525bc03b/summercandy/#mail
[animal]: https://page.stibee.com/subscriptions/126971
[animal_publ]: https://www.hani.co.kr/arti/animalpeople/home01.html
[animal_prvw]: https://page.stibee.com/archives/126971
[alice]: https://alicemedia.co/1d9f3dfb28654fa8a6d670fdaa40566f
[alice_publ]: https://www.instagram.com/alice_letter/
[alice_prvw]: https://m.blog.naver.com/PostList.nhn?blogId=alice_letter&categoryNo=1&logCode=0&categoryName=%EC%A7%80%EB%82%9C%ED%98%B8%20%EB%B3%B4%EA%B8%B0
[saltho]: https://mailchi.mp/b8843ed77ecd/saltho_subscription
[saltho_publ]: https://blog.naver.com/designpress2016
[saltho_prvw]: https://us8.campaign-archive.com/?e=[UNIQID]&u=2e9edbac18058219e61aab5fd&id=682f911635
[someone]: https://page.stibee.com/subscriptions/50103
[someone_publ]: https://www.facebook.com/somewon.yoon
[someone_prvw]: https://stibee.com/api/v1.0/emails/share/q5iDdzgvubYzN2wD6uJpzlcTQF1jvw==
[happy]: https://page.stibee.com/subscriptions/144920
[happy_publ]: instagram.com/happy_and_the_cute_factory/
[happy_prvw]: https://page.stibee.com/archives/144920
[alone]: https://page.stibee.com/subscriptions/97673
[alone_publ]: https://brunch.co.kr/@flicker
[alone_prvw]: https://page.stibee.com/archives/97673
[careet]: https://www.careet.net/
[careet_publ]: https://www.careet.net/About
[careet_prvw]: https://www.careet.net/331
[lostandfound]: https://page.stibee.com/subscriptions/52606
[lostandfound_publ]: https://www.notion.so/lostandfound1738/d20cb87a689849aaaf622749a89fcdf0
[lostandfound_prvw]: https://www.notion.so/20d04a65707441caa9d200af24b3d9db
[publy]: https://publy.us11.list-manage.com/subscribe?u=8e469b932eaa730d3a89bc869&id=f64c75daf2
[publy_publ]: https://publy.co/
<!-- [publy_prvw]: -->
[stibee]: https://page.stibee.com/subscriptions/3
[stibee_publ]: https://stibee.com/
[stibee_prvw]: https://page.stibee.com/archives/3
[booding]: https://www.booding.co/
[booding_publ]: https://www.booding.co/
[booding_prvw]: https://www.booding.co/post/%EB%A7%88%EC%A7%80%EB%A7%89-%EB%8B%A8%EC%B6%94%EB%8A%94-%EC%B1%84%EC%9B%8C%EC%95%BC-%EC%A0%9C%EB%A7%9B
[earth]: https://www.weeklyearth.com/
[earth_publ]: http://ecoseoul.or.kr/
[earth_prvw]: https://www.weeklyearth.com/view
[4days]: https://page.stibee.com/subscriptions/113860
[4days_publ]: https://www.instagram.com/4dayschallenge/
[4days_prvw]: https://page.stibee.com/archives/113860
[bgm]: https://docs.google.com/forms/d/e/1FAIpQLScCaqeKyDRUyADrL5guSx_Ny0YPqCat2Y3NJRjDYN84Zek7ow/viewform
[bgm_publ]: https://www.sellbuymusic.com/
<!-- [bgm_prvw]: -->
[weekend]: https://page.stibee.com/subscriptions/78183
[weekend_publ]: https://www.notion.so/2937e3e4f9884521a79198eac3cd07ef
[weekend_prvw]: https://page.stibee.com/archives/78183
[use4us]: https://page.stibee.com/subscriptions/110917
[use4us_publ]: https://www.instagram.com/jiguyong_official/
[use4us_prvw]: https://page.stibee.com/archives/110917
[nomwoosa]: https://docs.google.com/forms/d/1J-zpdimjf2cfO0PK6BM9JYd-8VprljCp3SAq05BzWzA/viewform?edit_requested=true
[nomwoosa_publ]: https://www.instagram.com/nomwoosa/
[nomwoosa_prvw]: https://page.stibee.com/archives/65672
[jletter]: https://page.stibee.com/subscriptions/49517
[jletter_publ]: https://haejunkim.oopy.io/
[jletter_prvw]: https://www.notion.so/J-d3ef9dc886d746e8b65343036f059300
[notionw]: https://www.sijin.me/wiki
[notionw_publ]: https://www.facebook.com/groups/notion.so/
[notionw_prvw]: https://www.sijin.me/wiki
[open.ads]: https://page.stibee.com/subscriptions/51974
[open.ads_publ]: http://www.openads.co.kr/home
[open.ads_prvw]: https://page.stibee.com/archives/51974
[qletter]: https://qletter.i-boss.co.kr/
[qletter_publ]: https://www.i-boss.co.kr/
[qletter_prvw]: https://qletter.i-boss.co.kr/
[bletter]: https://page.stibee.com/subscriptions/62723
[bletter_publ]: https://stibee.com/
[bletter_prvw]: https://beletter.email/BE-LETTER-bd348a9092044a1bbc95adfa25fccb55
[fig1]: https://page.stibee.com/subscriptions/111868
[fig1_publ]: https://www.youtube.com/channel/UCL6I7-H2694CN6z4HHBI5iA/videos
[fig1_prvw]: https://page.stibee.com/archives/111868
[seoul]: https://page.stibee.com/subscriptions/72985
[seoul_publ]: https://www.seoulwriter.com/about
[seoul_prvw]: https://page.stibee.com/archives/72985
[spread]: https://magazine-b.co.kr/newsletter/
[spread_publ]: https://magazine-b.co.kr/
[spread_prvw]: https://www.instagram.com/spreadbyb/
[stone]: https://stonebc.com/newsletter
[stone_publ]: https://stonebc.com/about
[stone_prvw]: https://stonebc.com/newsletter
[tmi.fm]: https://maily.so/draft.briefing
[tmi.fm_publ]: https://maily.so/draft.briefing
[tmi.fm_prvw]: https://maily.so/draft.briefing
[weeklyd]: https://page.stibee.com/subscriptions/29178
[weeklyd_publ]: https://medium.com/@jihyeonkwon
[weeklyd_prvw]: https://page.stibee.com/archives/29178
## 발간 중지
- [푼푼레터](https://punpun.co.kr/)
## 뉴스레터 플랫폼
- [Substack](https://substack.com/)
- [스티비](https://stibee.com/)
- [maily](https://maily.so/)
- [mailchimp](https://mailchimp.com/)
## 기타 뉴스레터 관련 서비스
- [heybunny](https://www.heybunny.io/)
### References
- [Awesome Newsletters](https://github.com/zudochkin/awesome-newsletters)
### License
[](http://creativecommons.org/publicdomain/zero/1.0/)
### TODO
- Contribution Guide
- Linter
## Contributors ✨
Thanks goes to these wonderful people ([emoji key](https://allcontributors.org/docs/en/emoji-key)):
<!-- ALL-CONTRIBUTORS-LIST:START - Do not remove or modify this section -->
<!-- prettier-ignore-start -->
<!-- markdownlint-disable -->
<table>
<tr>
<td align="center"><a href="https://ryanking13.github.io"><img src="https://avatars.githubusercontent.com/u/24893111?v=4?s=100" width="100px;" alt=""/><br /><sub><b>Gyeongjae Choi</b></sub></a><br /><a href="https://github.com/ryanking13/awesome-korean-newsletters/commits?author=ryanking13" title="Code">💻</a></td>
<td align="center"><a href="https://munjinoo.github.io/"><img src="https://avatars.githubusercontent.com/u/11063215?v=4?s=100" width="100px;" alt=""/><br /><sub><b>NOO</b></sub></a><br /><a href="https://github.com/ryanking13/awesome-korean-newsletters/commits?author=munjinoo" title="Code">💻</a></td>
</tr>
</table>
<!-- markdownlint-restore -->
<!-- prettier-ignore-end -->
<!-- ALL-CONTRIBUTORS-LIST:END -->
This project follows the [all-contributors](https://github.com/all-contributors/all-contributors) specification. Contributions of any kind welcome!
| {
"repo_name": "ryanking13/awesome-korean-newsletters",
"stars": "32",
"repo_language": "None",
"file_name": "custom.md",
"mime_type": "text/plain"
} |
---
name: New Newsletter
about: 새로운 뉴스레터 추가 요청
title: ''
labels: ''
assignees: ''
---
**1. 뉴스레터 이름**
**2. 뉴스레터 발간인**
**3. 뉴스레터 발간 주기**
**4. 뉴스레터 발간 형태**
**5. 뉴스레터 분류**
**6. 뉴스레터에 대한 간략한 소개**
**7. 뉴스레터 링크**
- 구독 신청을 할 수 있는 링크:
- 발간인 정보 링크:
- 미리보기 링크(optional):
| {
"repo_name": "ryanking13/awesome-korean-newsletters",
"stars": "32",
"repo_language": "None",
"file_name": "custom.md",
"mime_type": "text/plain"
} |
---
name: Custom issue template
about: Describe this issue template's purpose here.
title: ''
labels: ''
assignees: ''
---
| {
"repo_name": "ryanking13/awesome-korean-newsletters",
"stars": "32",
"repo_language": "None",
"file_name": "custom.md",
"mime_type": "text/plain"
} |
Microsoft Visual Studio Solution File, Format Version 12.00
# Visual Studio Version 16
VisualStudioVersion = 16.0.29519.87
MinimumVisualStudioVersion = 10.0.40219.1
Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "BoostTester", "BoostTester\BoostTester.vcxproj", "{65CD2F4A-21A3-4ABA-B3EB-663644C9CFDE}"
EndProject
Global
GlobalSection(SolutionConfigurationPlatforms) = preSolution
Debug|x64 = Debug|x64
Debug|x86 = Debug|x86
Release|x64 = Release|x64
Release|x86 = Release|x86
EndGlobalSection
GlobalSection(ProjectConfigurationPlatforms) = postSolution
{65CD2F4A-21A3-4ABA-B3EB-663644C9CFDE}.Debug|x64.ActiveCfg = Debug|x64
{65CD2F4A-21A3-4ABA-B3EB-663644C9CFDE}.Debug|x64.Build.0 = Debug|x64
{65CD2F4A-21A3-4ABA-B3EB-663644C9CFDE}.Debug|x86.ActiveCfg = Debug|Win32
{65CD2F4A-21A3-4ABA-B3EB-663644C9CFDE}.Debug|x86.Build.0 = Debug|Win32
{65CD2F4A-21A3-4ABA-B3EB-663644C9CFDE}.Release|x64.ActiveCfg = Release|x64
{65CD2F4A-21A3-4ABA-B3EB-663644C9CFDE}.Release|x64.Build.0 = Release|x64
{65CD2F4A-21A3-4ABA-B3EB-663644C9CFDE}.Release|x86.ActiveCfg = Release|Win32
{65CD2F4A-21A3-4ABA-B3EB-663644C9CFDE}.Release|x86.Build.0 = Release|Win32
EndGlobalSection
GlobalSection(SolutionProperties) = preSolution
HideSolutionNode = FALSE
EndGlobalSection
GlobalSection(ExtensibilityGlobals) = postSolution
SolutionGuid = {BA069B11-5290-4814-88F8-CA496D596126}
EndGlobalSection
EndGlobal
| {
"repo_name": "jedi95/BoostTester",
"stars": "36",
"repo_language": "C++",
"file_name": "CPUInfo.h",
"mime_type": "text/x-c++"
} |
<?xml version="1.0" encoding="utf-8"?>
<Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
<ItemGroup>
<Filter Include="Source Files">
<UniqueIdentifier>{4FC737F1-C7A5-4376-A066-2A32D752A2FF}</UniqueIdentifier>
<Extensions>cpp;c;cc;cxx;def;odl;idl;hpj;bat;asm;asmx</Extensions>
</Filter>
<Filter Include="Header Files">
<UniqueIdentifier>{93995380-89BD-4b04-88EB-625FBE52EBFB}</UniqueIdentifier>
<Extensions>h;hh;hpp;hxx;hm;inl;inc;ipp;xsd</Extensions>
</Filter>
<Filter Include="Resource Files">
<UniqueIdentifier>{67DA6AB6-F800-4c08-8B7A-83BB121AAD01}</UniqueIdentifier>
<Extensions>rc;ico;cur;bmp;dlg;rc2;rct;bin;rgs;gif;jpg;jpeg;jpe;resx;tiff;tif;png;wav;mfcribbon-ms</Extensions>
</Filter>
</ItemGroup>
<ItemGroup>
<ClCompile Include="BoostTester.cpp">
<Filter>Source Files</Filter>
</ClCompile>
</ItemGroup>
<ItemGroup>
<ClInclude Include="CPUInfo.h">
<Filter>Source Files</Filter>
</ClInclude>
</ItemGroup>
</Project> | {
"repo_name": "jedi95/BoostTester",
"stars": "36",
"repo_language": "C++",
"file_name": "CPUInfo.h",
"mime_type": "text/x-c++"
} |
// Test tool for finding maximum CPU boost clocks.
// This file is in the public domain.
#include <cstdlib>
#include <iostream>
#include <intrin.h>
#include "windows.h"
#include "CPUInfo.h"
using namespace std;
const unsigned int HALF_ARRAY = 0x1FFFFFF + 1;
const unsigned int ARRAY_SIZE = HALF_ARRAY * 2;
unsigned int* mem;
typedef BOOL(WINAPI* LPFN_GLPI)(
PSYSTEM_LOGICAL_PROCESSOR_INFORMATION,
PDWORD);
DWORD CountSetBits(ULONG_PTR bitMask)
{
DWORD LSHIFT = sizeof(ULONG_PTR) * 8 - 1;
DWORD bitSetCount = 0;
ULONG_PTR bitTest = (ULONG_PTR)1 << LSHIFT;
DWORD i;
for (i = 0; i <= LSHIFT; ++i)
{
bitSetCount += ((bitMask & bitTest) ? 1 : 0);
bitTest /= 2;
}
return bitSetCount;
}
char* getCpuidVendor(char* vendor) {
int data[4];
__cpuid(data, 0);
*reinterpret_cast<int*>(vendor) = data[1];
*reinterpret_cast<int*>(vendor + 4) = data[3];
*reinterpret_cast<int*>(vendor + 8) = data[2];
vendor[12] = 0;
return vendor;
}
int getCpuidFamily() {
int data[4];
__cpuid(data, 1);
int family = ((data[0] >> 8) & 0x0F);
int extendedFamily = (data[0] >> 20) & 0xFF;
int displayFamily = (family != 0x0F) ? family : (extendedFamily + family);
return displayFamily;
}
CPUInfo getCPUInfo()
{
LPFN_GLPI glpi;
BOOL done = FALSE;
PSYSTEM_LOGICAL_PROCESSOR_INFORMATION buffer = NULL;
PSYSTEM_LOGICAL_PROCESSOR_INFORMATION ptr = NULL;
DWORD returnLength = 0;
DWORD byteOffset = 0;
PCACHE_DESCRIPTOR Cache;
CPUInfo info;
info.cpuidFamily = getCpuidFamily();
getCpuidVendor(info.vendor);
glpi = (LPFN_GLPI)GetProcAddress(GetModuleHandle(TEXT("kernel32")), "GetLogicalProcessorInformation");
if (NULL == glpi)
{
cout << "GetLogicalProcessorInformation is not supported";
return info;
}
while (!done)
{
DWORD rc = glpi(buffer, &returnLength);
if (FALSE == rc)
{
if (GetLastError() == ERROR_INSUFFICIENT_BUFFER)
{
if (buffer)
{
free(buffer);
}
buffer = (PSYSTEM_LOGICAL_PROCESSOR_INFORMATION)malloc(returnLength);
if (NULL == buffer)
{
cout << "Error: Allocation failure";
return info;
}
}
else
{
cout << "Error: " << GetLastError();
return info;
}
}
else
{
done = TRUE;
}
}
ptr = buffer;
while (byteOffset + sizeof(SYSTEM_LOGICAL_PROCESSOR_INFORMATION) <= returnLength)
{
switch (ptr->Relationship)
{
case RelationNumaNode:
// Non-NUMA systems report a single record of this type.
info.numaNodeCount++;
break;
case RelationProcessorCore:
info.physicalCoreCount++;
info.logicalCoreCount += CountSetBits(ptr->ProcessorMask);
break;
case RelationCache:
Cache = &ptr->Cache;
if (Cache->Level == 1)
{
if (Cache->Type == CacheData) {
info.L1CacheCount++;
}
}
else if (Cache->Level == 2)
{
info.L2CacheCount++;
}
else if (Cache->Level == 3)
{
info.L3CacheCount++;
}
break;
case RelationProcessorPackage:
info.packageCount++;
break;
default:
break;
}
byteOffset += sizeof(SYSTEM_LOGICAL_PROCESSOR_INFORMATION);
ptr++;
}
free(buffer);
return info;
}
//The goal of this function is to create a "100%" load at extremely low IPC.
//The best way I can think of to do this is by constantly stalling waiting for data from RAM.
int runTest(int core) {
//Setup
SetThreadAffinityMask(GetCurrentThread(), (static_cast<DWORD_PTR>(1) << core));
//Randomly jump through the array
//This will alternate between the high and low half
//This is certain to run to completion because no element can contain the index for itself.
//This process should defeat branch predictors and prefetches
//and result in needing data from RAM on every loop iteration.
unsigned int value = mem[0];
for (int i = 0; i < ARRAY_SIZE; i++)
{
//Set value equal to the value stored at an array index
value = mem[value];
}
//Return final value to prevent loop from being optimized out
return value;
}
int main()
{
//Print info
cout << "CPU Max boost tester" << endl;
unsigned int memsize = ARRAY_SIZE / 256 / 1024;
cout << "Memory required: " << memsize << " MB" << endl;
//One time setup
mem = new unsigned int[ARRAY_SIZE];
//Populate memory array
cout << "Filling memory array" << endl;
for (unsigned int i = 0; i < HALF_ARRAY; i++)
{
//Fill low half of the array with values from the high half
mem[i] = i + HALF_ARRAY;
//Fill high half of the array with values for the low half
mem[i + HALF_ARRAY] = i;
}
//Now we shuffle the high and low part of the array.
//Doing it this way ensures that no element contains the index for itself
cout << "Performing array shuffle (low)" << endl;
for (unsigned int i = 0; i < HALF_ARRAY; i++) {
int r = rand() % HALF_ARRAY;
unsigned int temp = mem[i];
mem[i] = mem[r];
mem[r] = temp;
}
cout << "Performing array shuffle (high)" << endl;
for (unsigned int i = HALF_ARRAY; i < ARRAY_SIZE; i++) {
int r = (rand() % HALF_ARRAY) + HALF_ARRAY;
unsigned int temp = mem[i];
mem[i] = mem[r];
mem[r] = temp;
}
CPUInfo info = getCPUInfo();
int threadsPerCore = info.getThreadsPerCore();
//This value has no actual meaning, but is required to avoid runTest() being optimized out by the compiler
unsigned long counter = 0;
//This condition will never be false. Tricking the compiler....
while (counter < 0xFFFFFFFFF) {
for (int i = 0; i < info.logicalCoreCount; i+=threadsPerCore) {
cout << "Running on core: " << (i / threadsPerCore) << endl;
counter = runTest(i);
}
}
//Have to use the return from runTest() somewhere or it gets optimized out.
return counter;
} | {
"repo_name": "jedi95/BoostTester",
"stars": "36",
"repo_language": "C++",
"file_name": "CPUInfo.h",
"mime_type": "text/x-c++"
} |
<?xml version="1.0" encoding="utf-8"?>
<Project DefaultTargets="Build" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
<ItemGroup Label="ProjectConfigurations">
<ProjectConfiguration Include="Debug|Win32">
<Configuration>Debug</Configuration>
<Platform>Win32</Platform>
</ProjectConfiguration>
<ProjectConfiguration Include="Release|Win32">
<Configuration>Release</Configuration>
<Platform>Win32</Platform>
</ProjectConfiguration>
<ProjectConfiguration Include="Debug|x64">
<Configuration>Debug</Configuration>
<Platform>x64</Platform>
</ProjectConfiguration>
<ProjectConfiguration Include="Release|x64">
<Configuration>Release</Configuration>
<Platform>x64</Platform>
</ProjectConfiguration>
</ItemGroup>
<PropertyGroup Label="Globals">
<VCProjectVersion>16.0</VCProjectVersion>
<ProjectGuid>{65CD2F4A-21A3-4ABA-B3EB-663644C9CFDE}</ProjectGuid>
<Keyword>Win32Proj</Keyword>
<RootNamespace>BoostTester</RootNamespace>
<WindowsTargetPlatformVersion>10.0</WindowsTargetPlatformVersion>
</PropertyGroup>
<Import Project="$(VCTargetsPath)\Microsoft.Cpp.Default.props" />
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'" Label="Configuration">
<ConfigurationType>Application</ConfigurationType>
<UseDebugLibraries>true</UseDebugLibraries>
<PlatformToolset>v142</PlatformToolset>
<CharacterSet>Unicode</CharacterSet>
</PropertyGroup>
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|Win32'" Label="Configuration">
<ConfigurationType>Application</ConfigurationType>
<UseDebugLibraries>false</UseDebugLibraries>
<PlatformToolset>v142</PlatformToolset>
<WholeProgramOptimization>true</WholeProgramOptimization>
<CharacterSet>Unicode</CharacterSet>
</PropertyGroup>
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|x64'" Label="Configuration">
<ConfigurationType>Application</ConfigurationType>
<UseDebugLibraries>true</UseDebugLibraries>
<PlatformToolset>v142</PlatformToolset>
<CharacterSet>Unicode</CharacterSet>
</PropertyGroup>
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|x64'" Label="Configuration">
<ConfigurationType>Application</ConfigurationType>
<UseDebugLibraries>false</UseDebugLibraries>
<PlatformToolset>v142</PlatformToolset>
<WholeProgramOptimization>true</WholeProgramOptimization>
<CharacterSet>Unicode</CharacterSet>
</PropertyGroup>
<Import Project="$(VCTargetsPath)\Microsoft.Cpp.props" />
<ImportGroup Label="ExtensionSettings">
</ImportGroup>
<ImportGroup Label="Shared">
</ImportGroup>
<ImportGroup Label="PropertySheets" Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'">
<Import Project="$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props" Condition="exists('$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props')" Label="LocalAppDataPlatform" />
</ImportGroup>
<ImportGroup Label="PropertySheets" Condition="'$(Configuration)|$(Platform)'=='Release|Win32'">
<Import Project="$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props" Condition="exists('$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props')" Label="LocalAppDataPlatform" />
</ImportGroup>
<ImportGroup Label="PropertySheets" Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">
<Import Project="$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props" Condition="exists('$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props')" Label="LocalAppDataPlatform" />
</ImportGroup>
<ImportGroup Label="PropertySheets" Condition="'$(Configuration)|$(Platform)'=='Release|x64'">
<Import Project="$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props" Condition="exists('$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props')" Label="LocalAppDataPlatform" />
</ImportGroup>
<PropertyGroup Label="UserMacros" />
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'">
<LinkIncremental>true</LinkIncremental>
</PropertyGroup>
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">
<LinkIncremental>true</LinkIncremental>
</PropertyGroup>
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|Win32'">
<LinkIncremental>false</LinkIncremental>
</PropertyGroup>
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|x64'">
<LinkIncremental>false</LinkIncremental>
</PropertyGroup>
<ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'">
<ClCompile>
<PrecompiledHeader>
</PrecompiledHeader>
<WarningLevel>Level3</WarningLevel>
<Optimization>Disabled</Optimization>
<SDLCheck>true</SDLCheck>
<PreprocessorDefinitions>WIN32;_DEBUG;_CONSOLE;%(PreprocessorDefinitions)</PreprocessorDefinitions>
<ConformanceMode>true</ConformanceMode>
</ClCompile>
<Link>
<SubSystem>Console</SubSystem>
<GenerateDebugInformation>true</GenerateDebugInformation>
</Link>
</ItemDefinitionGroup>
<ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">
<ClCompile>
<PrecompiledHeader>
</PrecompiledHeader>
<WarningLevel>Level3</WarningLevel>
<Optimization>Disabled</Optimization>
<SDLCheck>true</SDLCheck>
<PreprocessorDefinitions>_DEBUG;_CONSOLE;%(PreprocessorDefinitions)</PreprocessorDefinitions>
<ConformanceMode>true</ConformanceMode>
</ClCompile>
<Link>
<SubSystem>Console</SubSystem>
<GenerateDebugInformation>true</GenerateDebugInformation>
</Link>
</ItemDefinitionGroup>
<ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Release|Win32'">
<ClCompile>
<PrecompiledHeader>
</PrecompiledHeader>
<WarningLevel>Level3</WarningLevel>
<Optimization>MaxSpeed</Optimization>
<FunctionLevelLinking>true</FunctionLevelLinking>
<IntrinsicFunctions>true</IntrinsicFunctions>
<SDLCheck>true</SDLCheck>
<PreprocessorDefinitions>WIN32;NDEBUG;_CONSOLE;%(PreprocessorDefinitions)</PreprocessorDefinitions>
<ConformanceMode>true</ConformanceMode>
</ClCompile>
<Link>
<SubSystem>Console</SubSystem>
<EnableCOMDATFolding>true</EnableCOMDATFolding>
<OptimizeReferences>true</OptimizeReferences>
<GenerateDebugInformation>true</GenerateDebugInformation>
</Link>
</ItemDefinitionGroup>
<ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Release|x64'">
<ClCompile>
<PrecompiledHeader>
</PrecompiledHeader>
<WarningLevel>Level3</WarningLevel>
<Optimization>MaxSpeed</Optimization>
<FunctionLevelLinking>true</FunctionLevelLinking>
<IntrinsicFunctions>true</IntrinsicFunctions>
<SDLCheck>true</SDLCheck>
<PreprocessorDefinitions>NDEBUG;_CONSOLE;%(PreprocessorDefinitions)</PreprocessorDefinitions>
<ConformanceMode>true</ConformanceMode>
<FavorSizeOrSpeed>Speed</FavorSizeOrSpeed>
<OmitFramePointers>true</OmitFramePointers>
<BufferSecurityCheck>false</BufferSecurityCheck>
<EnableEnhancedInstructionSet>AdvancedVectorExtensions2</EnableEnhancedInstructionSet>
</ClCompile>
<Link>
<SubSystem>Console</SubSystem>
<EnableCOMDATFolding>true</EnableCOMDATFolding>
<OptimizeReferences>true</OptimizeReferences>
<GenerateDebugInformation>true</GenerateDebugInformation>
</Link>
</ItemDefinitionGroup>
<ItemGroup>
<ClCompile Include="BoostTester.cpp" />
</ItemGroup>
<ItemGroup>
<ClInclude Include="CPUInfo.h" />
</ItemGroup>
<Import Project="$(VCTargetsPath)\Microsoft.Cpp.targets" />
<ImportGroup Label="ExtensionTargets">
</ImportGroup>
</Project> | {
"repo_name": "jedi95/BoostTester",
"stars": "36",
"repo_language": "C++",
"file_name": "CPUInfo.h",
"mime_type": "text/x-c++"
} |
<?xml version="1.0" encoding="utf-8"?>
<Project ToolsVersion="Current" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
<PropertyGroup />
</Project> | {
"repo_name": "jedi95/BoostTester",
"stars": "36",
"repo_language": "C++",
"file_name": "CPUInfo.h",
"mime_type": "text/x-c++"
} |
#pragma once
class CPUInfo
{
public:
int numaNodeCount = 0;
int packageCount = 0;
int physicalCoreCount = 0;
int logicalCoreCount = 0;
int L1CacheCount = 0;
int L2CacheCount = 0;
int L3CacheCount = 0;
char vendor[13];
int cpuidFamily;
double ticksPerNanosecond;
int getThreadsPerCore() { return logicalCoreCount / physicalCoreCount; }
int getCoresPerNode() { return physicalCoreCount / numaNodeCount; }
int getCoresPerPackage() { return physicalCoreCount / packageCount; }
int getCoresPerL3() { return physicalCoreCount / L3CacheCount; }
int getCoresPerL2() { return physicalCoreCount / L2CacheCount; }
int getL3PerPackage() { return L3CacheCount / packageCount; }
int getL3PerNUMANode() { return L3CacheCount / numaNodeCount; }
};
| {
"repo_name": "jedi95/BoostTester",
"stars": "36",
"repo_language": "C++",
"file_name": "CPUInfo.h",
"mime_type": "text/x-c++"
} |
// This build is for this Giter8 template.
// To test the template run `g8` or `g8Test` from the sbt session.
// See http://www.foundweekends.org/giter8/testing.html#Using+the+Giter8Plugin for more details.
lazy val root = (project in file(".")).
settings(
name := "hello-world",
test in Test := {
val _ = (g8Test in Test).toTask("").value
},
scriptedLaunchOpts ++= List("-Xms1024m", "-Xmx1024m", "-XX:ReservedCodeCacheSize=128m", "-XX:MaxPermSize=256m", "-Xss2m", "-Dfile.encoding=UTF-8"),
resolvers += Resolver.url("typesafe", url("https://repo.typesafe.com/typesafe/ivy-releases/"))(Resolver.ivyStylePatterns)
)
| {
"repo_name": "scala/hello-world.g8",
"stars": "27",
"repo_language": "Scala",
"file_name": "Main.scala",
"mime_type": "text/plain"
} |
A [Giter8][g8] template for a Hello World application, used in the [Getting Started with Scala guide](https://docs.scala-lang.org/getting-started-sbt-track/getting-started-with-scala-and-sbt-on-the-command-line.html).
Template license
----------------
Written in 2017-2022 by the Scala Center
To the extent possible under law, the author(s) have dedicated all copyright and related
and neighboring rights to this template to the public domain worldwide.
This template is distributed without any warranty. See <http://creativecommons.org/publicdomain/zero/1.0/>.
[g8]: http://www.foundweekends.org/giter8/
| {
"repo_name": "scala/hello-world.g8",
"stars": "27",
"repo_language": "Scala",
"file_name": "Main.scala",
"mime_type": "text/plain"
} |
name: Scala CLA
on: [pull_request]
jobs:
check:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- run: ./project/scripts/check-cla.sh
env:
AUTHOR: ${{ github.event.pull_request.user.login }}
| {
"repo_name": "scala/hello-world.g8",
"stars": "27",
"repo_language": "Scala",
"file_name": "Main.scala",
"mime_type": "text/plain"
} |
name: test
on:
push:
branches:
- main
pull_request:
jobs:
test:
strategy:
fail-fast: false
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- uses: coursier/cache-action@v6
- uses: actions/setup-java@v2
with:
distribution: temurin
java-version: 8
- name: Test
# This runs the template with the default parameters, and runs test within the templated app.
run: sbt -Dfile.encoding=UTF8 -J-XX:ReservedCodeCacheSize=256M test
| {
"repo_name": "scala/hello-world.g8",
"stars": "27",
"repo_language": "Scala",
"file_name": "Main.scala",
"mime_type": "text/plain"
} |
addSbtPlugin("org.foundweekends.giter8" %% "sbt-giter8" % "0.16.2")
| {
"repo_name": "scala/hello-world.g8",
"stars": "27",
"repo_language": "Scala",
"file_name": "Main.scala",
"mime_type": "text/plain"
} |
sbt.version=1.9.2
| {
"repo_name": "scala/hello-world.g8",
"stars": "27",
"repo_language": "Scala",
"file_name": "Main.scala",
"mime_type": "text/plain"
} |
#!/usr/bin/env bash
set -eux
AUTHOR=$GITHUB_ACTOR
echo "Pull request submitted by $AUTHOR";
signed=$(curl -s https://www.lightbend.com/contribute/cla/scala/check/$AUTHOR | jq -r ".signed");
if [ "$signed" = "true" ] ; then
echo "CLA check for $AUTHOR successful";
else
echo "CLA check for $AUTHOR failed";
echo "Please sign the Scala CLA to contribute to the Scala compiler.";
echo "Go to https://www.lightbend.com/contribute/cla/scala and then";
echo "comment on the pull request to ask for a new check.";
echo "";
echo "Check if CLA is signed: https://www.lightbend.com/contribute/cla/scala/check/$AUTHOR";
exit 1;
fi;
| {
"repo_name": "scala/hello-world.g8",
"stars": "27",
"repo_language": "Scala",
"file_name": "Main.scala",
"mime_type": "text/plain"
} |
// The simplest possible sbt build file is just one line:
scalaVersion := "2.13.8"
// That is, to create a valid sbt build, all you've got to do is define the
// version of Scala you'd like your project to use.
// ============================================================================
// Lines like the above defining `scalaVersion` are called "settings". Settings
// are key/value pairs. In the case of `scalaVersion`, the key is "scalaVersion"
// and the value is "2.13.8"
// It's possible to define many kinds of settings, such as:
name := "hello-world"
organization := "ch.epfl.scala"
version := "1.0"
// Note, it's not required for you to define these three settings. These are
// mostly only necessary if you intend to publish your library's binaries on a
// place like Sonatype.
// Want to use a published library in your project?
// You can define other libraries as dependencies in your build like this:
libraryDependencies += "org.scala-lang.modules" %% "scala-parser-combinators" % "2.1.1"
// Here, `libraryDependencies` is a set of dependencies, and by using `+=`,
// we're adding the scala-parser-combinators dependency to the set of dependencies
// that sbt will go and fetch when it starts up.
// Now, in any Scala file, you can import classes, objects, etc., from
// scala-parser-combinators with a regular import.
// TIP: To find the "dependency" that you need to add to the
// `libraryDependencies` set, which in the above example looks like this:
// "org.scala-lang.modules" %% "scala-parser-combinators" % "2.1.1"
// You can use Scaladex, an index of all known published Scala libraries. There,
// after you find the library you want, you can just copy/paste the dependency
// information that you need into your build file. For example, on the
// scala/scala-parser-combinators Scaladex page,
// https://index.scala-lang.org/scala/scala-parser-combinators, you can copy/paste
// the sbt dependency from the sbt box on the right-hand side of the screen.
// IMPORTANT NOTE: while build files look _kind of_ like regular Scala, it's
// important to note that syntax in *.sbt files doesn't always behave like
// regular Scala. For example, notice in this build file that it's not required
// to put our settings into an enclosing object or class. Always remember that
// sbt is a bit different, semantically, than vanilla Scala.
// ============================================================================
// Most moderately interesting Scala projects don't make use of the very simple
// build file style (called "bare style") used in this build.sbt file. Most
// intermediate Scala projects make use of so-called "multi-project" builds. A
// multi-project build makes it possible to have different folders which sbt can
// be configured differently for. That is, you may wish to have different
// dependencies or different testing frameworks defined for different parts of
// your codebase. Multi-project builds make this possible.
// Here's a quick glimpse of what a multi-project build looks like for this
// build, with only one "subproject" defined, called `root`:
// lazy val root = (project in file(".")).
// settings(
// inThisBuild(List(
// organization := "ch.epfl.scala",
// scalaVersion := "2.13.8"
// )),
// name := "hello-world"
// )
// To learn more about multi-project builds, head over to the official sbt
// documentation at http://www.scala-sbt.org/documentation.html
| {
"repo_name": "scala/hello-world.g8",
"stars": "27",
"repo_language": "Scala",
"file_name": "Main.scala",
"mime_type": "text/plain"
} |
name=Hello World template
description=A template to demonstrate a minimal Scala application | {
"repo_name": "scala/hello-world.g8",
"stars": "27",
"repo_language": "Scala",
"file_name": "Main.scala",
"mime_type": "text/plain"
} |
sbt.version=1.9.2
| {
"repo_name": "scala/hello-world.g8",
"stars": "27",
"repo_language": "Scala",
"file_name": "Main.scala",
"mime_type": "text/plain"
} |
object Main extends App {
println("Hello, World!")
} | {
"repo_name": "scala/hello-world.g8",
"stars": "27",
"repo_language": "Scala",
"file_name": "Main.scala",
"mime_type": "text/plain"
} |
<?xml version="1.0" encoding="UTF-8"?>
<simplemind-mindmaps doc-version="3" generator="SimpleMindTouch" gen-version="1.8.0" device-type="ipad"><mindmap><meta><guid guid="EDE0E58A359CFB3534434AA0"></guid><title text="Domain 5\NTelecommunications and Network Security"></title><page><visual-area x="-798.06" y="0.00" width="2065.11" height="1330.91"></visual-area></page><style key="system.spring-levels"></style><auto-numbering style="disabled"></auto-numbering><scrollstate zoom="129" x="-46.06" y="1170.00"></scrollstate><selection type="node" id="140"></selection><main-centraltheme id="0"></main-centraltheme></meta><topics><topic id="0" parent="-1" x="500.00" y="500.00" text="Domain 5\NTelecommunications and Network Security"></topic><topic id="1" parent="0" x="784.29" y="500.79" text="Open Systems\NInterconnection Reference\NModel"></topic><topic id="2" parent="0" x="872.01" y="338.72" text="TCP/IP Model"></topic><topic id="3" parent="2" x="930.11" y="387.52" text="OSI model"><note>ISO 7498
Systems based on this model are called open systems
APSTNDP—To remember all the layers within the OSI model in the correct order, memorize “All People Seem To Need Data Processing.” Remember that you are starting at layer 7, the application layer, at the top.</note></topic><topic id="4" parent="3" x="1038.10" y="297.85" text="Application"><note>Provide file transmission, message exchange, terminal session,...
Examples: HTTP, SMTP, FTP, Telnet, LPD</note></topic><topic id="5" parent="3" x="1056.48" y="525.90" text="Physical"><note>converts bits into voltage for transmission.
This layer controls synchronization, data rates, line noise, and transmission techniques. Specifications for the physical layer include the timing of voltage changes, voltage levels, and the physical connectors for electrical, optical, and mechanical transmission.
Network interface cards and drivers convert bits into electrical signals and control the physical aspects of data transmission, including optical, electrical, and mechanical requirements. The following are some of the standard interfaces at this layer:
EIA-422, EIA-423, RS-449, RS-485
10BASE-T, 10BASE2, 10BASE5, 100BASE-TX, 100BASE-FX, 100BASE-T, 1000BASE-T, 1000BASE-SX
Integrated Services Digital Network (ISDN)
Digital subscriber line (DSL)
Synchronous Optical Networking (SONET)</note></topic><topic id="6" parent="3" x="1054.41" y="491.54" text="Data link"><note>The data link layer is where the network stack knows what format the data frame must be in to transmit properly over Token Ring, Ethernet, ATM, or Fiber Distributed Data Interface (FDDI) networks.
The data link layer is responsible for proper communication within the network components and for changing the data into the necessary format (electrical voltage) for the physical layer. It will also manage to reorder frames that are received out of sequence, and notify upper-layer protocols when there are transmission error conditions.
Some protocols that work at this layer include the following:
Address Resolution Protocol (ARP)
Reverse Address Resolution Protocol (RARP)
Point-to-Point Protocol (PPP)
Serial Line Internet Protocol (SLIP)
Ethernet
Token Ring
FDDI
ATM
When the data link layer applies the last header and trailer to the data message, this is referred to as framing. The unit of data is now called a frame.</note></topic><topic id="7" parent="6" x="1173.57" y="477.79" text="Logical link control LLC"><note>The LLC, defined in the IEEE 802.2 specification, communicates with the protocol immediately above it, the network layer.
The LLC layer takes care of flow control and error checking.</note></topic><topic id="8" parent="6" x="1186.05" y="511.66" text="Media Access Control MAC"><note>The technology at the MAC sublayer knows if the network is Ethernet, Token Ring, or ATM, so it knows how to put the last header and trailer on the packet before it “hits the wire” for transmission.
The IEEE MAC specification for Ethernet is 802.3, Token Ring is 802.5, wireless LAN is 802.11, and so on. So when you see a reference to an IEEE standard, such as 802.11, 802.16, or 802.3, it refers to the protocol working at the MAC sublayer of the data link layer of a protocol stack.</note></topic><topic id="9" parent="3" x="1036.53" y="374.12" text="Session"><note>The session layer protocols set up connections between applications; maintain dialog control; and negotiate, establish, maintain, and tear down the communication channel.
Some of the protocols that work at this layer include
Network File System (NFS)
NetBIOS
Structured Query Language (SQL)
Remote procedure call (RPC)
3 modes of operation:
Simplex: communication takes place one direction
Half-duplex: communication goes both directions, but only one application can send data at a time
Full-duplex: both directions, data can be send at the same time from both sides
Session layer protocols are the least used; thus many of them should be disabled on systems to decrease the chance of them getting exploited.</note></topic><topic id="10" parent="3" x="1042.80" y="334.26" text="Presentation"><note>Works as a translator. It adds information about the file type to tell the destination computer how to process and present it.
This layer also handles data compression and encryption ( tells how it was compresses and encrypted)</note></topic><topic id="11" parent="3" x="1044.29" y="410.21" text="Transport"><note>The protocols at the transport layer handle end-to-end transmission (connections between computer systems) and segmentation of a data stream. The following protocols work at this layer:
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
Sequenced Packet Exchange (SPX)</note></topic><topic id="12" parent="3" x="1044.64" y="452.14" text="Network"><note>The main responsibilities of the network layer, layer 3, are to insert information into the packet’s header so it can be properly addressed and routed, and then to actually route the packets to their proper destination.
The protocols that work at this layer do not ensure the delivery of the packets.
The responsibilities of the network layer protocols include internetworking service, addressing, and routing. The following lists some of the protocols that work at this layer:
Internet Protocol (IP)
Internet Control Message Protocol (ICMP)
Internet Group Management Protocol (IGMP)
Routing Information Protocol (RIP)
Open Shortest Path First (OSPF)
Internetwork Packet Exchange (IPX)
We are talking about packets/datagrams at this layer</note></topic><topic id="13" parent="2" x="837.45" y="284.52" text="TCP/IP"></topic><topic id="14" parent="13" x="879.81" y="249.47" text="IP "><note>IP is a connectionless network layer protocol and provides datagram routing services. IP’s main task is to support internetwork addressing and packet routing.</note></topic><topic id="15" parent="13" x="804.25" y="198.56" text="TCP\NUDP"><note>transport layer protocols
They both use ports to communicate with upper OSI layers and to keep track of various conversations that take place simultaneously.
TCP is a reliable and connection-oriented protocol.
It also supports packet sequencing (to ensure each and every packet was received), flow and congestion control, and error detection and correction.
UDP, on the other hand, is a best-effort and connectionless protocol. It has neither packet sequencing nor flow and congestion control, and the destination does not acknowledge every packet it receives.</note></topic><topic id="16" parent="15" x="731.67" y="129.05" text="Socket"><note>When a TCP or UDP message is formed, source and destination ports are contained within the header information along with the source and destination IP addresses. This makes up a socket, and is how packets know where to go (by the address) and how to communicate with the right service or protocol on the other computer (by the port number).</note></topic><topic id="17" parent="15" x="784.51" y="126.39" text="Ports"><note>1.well-known ports : 0-1023
2.Registered ports : 1024 - 49151
3.Dynamic ports : 49152 - 65535
1. almost every computer in the world has the exact same protocol mapped to the exact same port number.
2.can be registered with the Internet Corporation for Assigned Names and Numbers (ICANN) for a particular use. Vendors register specific ports to map to their proprietary software
3. These are available to be used by any application</note></topic><topic id="18" parent="15" x="703.04" y="169.91" text="TCP handshake"><note>TCP must set up a virtual connection between two hosts before any data are sent. This means the two hosts must agree on certain parameters, data flow, windowing, error detection, and options.
The TCP three-way handshake:
1. SYN
2. SYN/ACK
3. ACK
The connection that has been set up at this point is considered full duplex
Attacks:
SYN flood - attacker sends SYN packets with a spoofed address, then the victim system replies to the spoofed address with SYN/ACK packets. Each time the victim system receives one of these SYN packets it sets aside resources to manage the new connection. If the attacker floods the victim system with SYN packets, eventually the victim system allocates all of its available TCP connection resources and can no longer process new requests. This is a type of DoS.
To thwart this type of attack you can use SYN proxies, which limit the number of open and abandoned network connections.
TCP session hijacking
the attacker has to spoof the sender’s address and use the correct sequence number values. If an attacker can correctly predict the TCP sequence numbers that two systems will use, then he can create packets containing those numbers and fool the receiving system into thinking that the packets are coming from the authorized sending system.</note></topic><topic id="19" parent="13" x="735.43" y="231.02" text="IP Addressing"><note>Class A - 0.0.0.0 -> 127.255.255.255
Class B - 128.0.0.0 -> 191.255.255.255
Class C - 192.0.0.0 -> 223.255.255.255
Class D - 224.0.0.0 -> 239.255.255.255
Class E - 240.0.0.0 -> 255.255.255.255
A - first byte is the network address
B - first two bytes are the network address,rest two are the host portion
C - the first 3 bytes are the network portion, and the remaining one byte is the host portion
D - used for multicast addresses
E - reserved for research
classful or classical IP addresses - traditional subnet masks are used
classless IP addresses - subnets that do not follow these traditional sizes
classless interdomain routing (CIDR)
Note
IP provides addressing, packet fragmentation, and packet timeouts. To ensure that packets do not continually traverse a network forever, IP provides a Time to Live (TTL) value that is decremented every time the packet passes through a router. IP can also provide a Type of Service (ToS) capability, which means it can prioritize different packets for time-sensitive functions.</note></topic><topic id="20" parent="13" x="857.54" y="210.24" text="IPv6"><note>The IPv6 specification is outlined in RFC 2460
IPv6 address size is 128 bits
The scalability of multicast routing is improved by adding a “scope” field to multicast addresses. Also, a new type of address called an anycast address is defined, which is used to send a packet to any one of a group of nodes.</note></topic><topic id="21" parent="20" x="866.46" y="167.39" text="Tunneling"><note>Automatic tunneling is a technique where the routing infrastructure automatically determines the tunnel endpoints so that protocol tunneling can take place without preconfiguration.
The 6to4 and Teredo are intersite tunneling mechanisms, and ISATAP is an intrasite mechanism.
6to4
In the 6to4 tunneling method the tunnel endpoints are determined by using a well-known IPv4 anycast address on the remote side and embeds IPv4 address data within IPv6 addresses on the local side.
Teredo
is another automatic tunneling technique that uses UDP encapsulation so that NAT address translations are not affected.
Intra-Site Automatic Tunnel Addressing Protocol (ISA-TAP)
treats the IPv4 network as a virtual IPv6 local link, with mappings from each IPv4 address to a link-local IPv6 address.</note></topic><topic id="22" parent="2" x="964.32" y="245.28" text="Layer 2 Security\NStandards"></topic><topic id="23" parent="22" x="992.17" y="190.89" text="802.1X EAP-TLS\Nframework"><note>When a new device is installed on the network, it cannot just start communicating with other devices, receive an IP address from a Dynamic Host Configuration Protocol (DHCP) server, resolve names with the Domain Name Service (DNS) server, etc. The device cannot carry out any network activity until it is authorized to do so. So 802.1X port authentication kicks in, which means that only authentication data are allowed to travel from the new device to the authenticating server. The authentication data is the digital certificate and hardware identity associated with that device (802.1AR), which is processed by EAP-TLS. Once the device is authenticated, usually by a Remote Authentication Dial-In User Server (RADIUS) server, encryption keying material is negotiated and agreed upon between surrounding network devices. Once the keying material is installed, then data encryption and frame integrity checking can take place (802.1AE) as traffic goes from one network device to the next.</note></topic><topic id="24" parent="23" x="1017.89" y="122.58" text="802.1AR\NDevID"><note>The IEEE 802.1AR standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device (router, switch, access point) to its identifiers.</note></topic><topic id="25" parent="23" x="1080.94" y="149.39" text="802.1AE\NMACSec"><note>802.1AE is the IEEE MAC Security standard (MACSec)
Provides hop-to-hop protection, only authenticated and trusted devices on the network can communicate to each other.
When a frame arrives at a device that is configured with MACSec, the MACSec Security Entity (SecY) decrypts the frame if necessary and computes an integrity check value (ICV) on the frame and compares it with the ICV that was sent with the frame. If the ICVs match, the device processes the frame. If they do not match, the device handles the frame according to a preconfigured policy, such as discarding it.</note></topic><topic id="26" parent="23" x="952.98" y="114.20" text="802.1AF"><note>802.1AF carries out key agreement functions for the session keys used for data encryption.</note></topic><topic id="27" parent="0" x="562.92" y="172.95" text="Types of Transmission"></topic><topic id="28" parent="27" x="365.19" y="84.39" text="Signals"><note>Digital signals :
Binary digits are represented and transmitted as discrete electrical pulses. Signaling allows for higher data transfer rates and high data integrity compared to analog signaling.
Analog signals :
Continuously varying electromagnetic wave that represents and transmits data. Carrier signals vary by amplification and frequency.</note></topic><topic id="29" parent="27" x="459.18" y="84.59" text="Asynchronous and\NSynchronous"><note>Synchronous:
- Robust error checking, commonly through cyclic redundancy checking (CRC)
- Timing component for data transmission synchronization
- Used for high-speed, high-volume transmissions
- Minimal overhead compared to asynchronous communication
Asynchronous:
- No timing component
- Surrounds each byte with processing bits
- Parity bit used for error control
- Each byte requires three bits of instruction (start, stop, parity)</note></topic><topic id="30" parent="27" x="675.65" y="80.61" text="Broadband and Baseband"><note>Baseband transmission :
Uses the full bandwidth for only one communication channel and has a low data transfer rate compared to broadband.
Broadband transmission :
Divides the bandwidth of a communication channel into many channels, enabling different types of data to be transmitted at one time.</note></topic><topic id="31" parent="27" x="561.65" y="37.01" text="Bandwidth and\Nthroughput"><note>Bandwidth refers to the number of electrical pulses that can be transmitted over a link within a second, and these electrical pulses carry individual bits of information. Bandwidth is the data transfer capability of a connection and is commonly associated with the amount of available frequencies and speed of a link.
Data throughput is the actual amount of data that can be carried over this connection. Data throughput values can be higher than bandwidth values if compression mechanisms are implemented.</note></topic><topic id="32" parent="0" x="236.71" y="177.55" text="Cabling"></topic><topic id="33" parent="32" x="191.41" y="122.08" text="Coaxial"><note>Coaxial cable has a copper core that is surrounded by a shielding layer and grounding wire. This is all encased within a protective outer jacket.
Compared to twisted-pair cable, coaxial cable is more resistant to electromagnetic interference (EMI), provides a higher bandwidth, and supports the use of longer cable lengths, but Twisted-pair cable is cheaper and easier to work with.
Coaxial cabling is used as a transmission line for radio frequency signals. If you have cable TV, you have coaxial cabling entering your house and the back of your TV. The various TV channels are carried over different radio frequencies. This technology allows to use some of the “empty” TV frequencies for Internet connectivity.</note></topic><topic id="34" parent="32" x="132.62" y="167.04" text="Twisted pair"><note>Twisted-pair cabling has insulated copper wires surrounded by an outer protective jacket.
Shielded twisted pair (STP):
the cable has an outer foil shielding. This adds protection from radio frequency interference and electromagnetic interference.
Unshielded twisted pair (UTP):
Twisted-pair cabling, which does not have this extra outer shielding
Twisting of the wires protects the integrity and strength of the signals they carry. Each wire forms a balanced circuit, because the voltage in each pair uses the same amplitude, just with opposite phases. The tighter the twisting of the wires, the more resistant the cable is to interference and attenuation.</note></topic><topic id="35" parent="34" x="73.25" y="121.68" text="Cable ratings"><note>Category 1:
- Voice-grade telephone cable for up to 1 Mbps transmission rate
- Not recommended for network use, but modems can communicate over it.
Category 2:
- Data transmission up to 4 Mbps
- Used in mainframe and minicomputer terminal connections, but not recommended for high-speed networking.
Category 3:
- 10 Mbps for Ethernet and 4 Mbps for Token Ring
- Used in 10Base-T network installations.
Category 4:
- 16 Mbps
- Usually used in Token Ring networks.
Category 5:
- 100 Mbps; has high twisting and thus low crosstalk
- Used in 100Base-TX, CDDI, Ethernet, and ATM installations; most widely used in network installations.
Category 6:
- 10 Gbps
- Used in new network installations requiring high-speed transmission. Standard for Gigabit Ethernet.
Category 7:
- 10 Gbps
- Used in new network installations requiring higher-speed transmission.</note></topic><topic id="36" parent="32" x="247.49" y="70.85" text="Fiber optic"><note>Fiber-optic cabling has higher transmission speeds that allow signals to travel over longer distances. Fiber cabling is not as affected by attenuation and EMI when compared to cabling that uses copper. It does not radiate signals, as does UTP cabling, and is difficult to eavesdrop on; therefore, fiber-optic cabling is much more secure than UTP, STP, or coaxial.
Fiber-optic cable is expensive and difficult to work with. It is usually used in backbone networks and environments that require high data transfer rates.</note></topic><topic id="37" parent="36" x="265.21" y="23.68" text="Modes"><note>Single mode
Small glass core, and are used for high-speed data transmission over long distances. They are less susceptible to attenuation than multimode fibers.
Multimode
Large glass cores, and are able to carry more data than single-core fibers, though they are best for shorter distances because of their higher attenuation levels.</note></topic><topic id="38" parent="32" x="319.71" y="180.11" text="Problems"></topic><topic id="39" parent="38" x="406.11" y="182.78" text="Noise"><note>Noise can be caused by motors, computers, copy machines, fluorescent lighting, and microwave ovens, to name a few. This background noise can combine with the data being transmitted over the cable and distort the signal. The more noise there is interacting with the cable, the more likely the receiving end will not receive the data in the form originally transmitted.</note></topic><topic id="40" parent="38" x="404.56" y="223.95" text="Attenuation"><note>Attenuation is the loss of signal strength as it travels.
The longer a cable, the more attenuation occurs, which causes the signal carrying the data to deteriorate. This is why standards include suggested cable-run lengths.
The effects of attenuation increase with higher frequencies; thus, 100Base-TX at 80MHz has a higher attenuation rate than 10Base-T at 10MHz.
If a network administrator needs to run a cable longer than its recommended segment length, he needs to insert a repeater or some type of device that will amplify the signal and ensure it gets to its destination in the right encoding format.
Attenuation can also be caused by cable breaks and malfunctions. This is why cables should be tested. If a cable is suspected of attenuation problems, cable testers can inject signals into the cable and read the results at the end of the cable.</note></topic><topic id="41" parent="38" x="356.71" y="272.89" text="Crosstalk"><note>Crosstalk is a phenomenon that occurs when electrical signals of one wire spill over to the signals of another wire. When the different electrical signals mix, their integrity degrades and data corruption can occur. UTP is much more vulnerable to crosstalk than STP or coaxial because it does not have extra layers of shielding to help protect against it.
The two-wire pairs within twisted-pair cables form a balanced circuit because they both have the same amplitude, just with different phases. Crosstalk and background noise can throw off this balance, and the wire can actually start to act like an antenna, which means it will be more susceptible to picking up other noises in the environment.</note></topic><topic id="42" parent="32" x="196.93" y="239.00" text="Fire rating"><note>Some cables produce hazardous gases when on fire that would spread throughout the building quickly. Network cabling that is placed in these types of areas, called plenum space, must meet a specific fire rating to ensure it will not produce and release harmful chemicals in case of a fire. A ventilation system’s components are usually located in this plenum space, so if toxic chemicals were to get into that area, they could easily spread throughout the building in minutes.
Nonplenum cables usually have a polyvinyl chloride (PVC) jacket covering, whereas plenum-rated cables have jacket covers made of fluoropolymers.
Cables should be installed in unexposed areas so they are not easily tripped over, damaged, or eavesdropped upon. The cables should be strung behind walls and in the protected spaces as in dropped ceilings. In environments that require extensive security, wires are encapsulated within pressurized conduits so if someone attempts to access a wire, the pressure of the conduit will change, causing an alarm to sound and a message to be sent to the security staff.</note></topic><topic id="43" parent="32" x="297.32" y="133.11" text="Standards"><note>The standards are developed and maintained by the Telecommunications Industry Association (TIA) and the Electronic Industries Association (EIA).
The TIA/EIA-568-B standard enables the design and implementation of structured cabling systems for commercial buildings.
The majority of the standards define cabling types, distances, connectors, cable system architectures, cable termination standards and performance characteristics, cable installation requirements, and methods of testing installed cable.
The following are commonly used physical interface connection standards:
RJ-11 is often used for terminating telephone wires.
RJ-45 is often used to terminate twisted-pair cables in Ethernet environments.
BNC (British Naval Connector) is often used for terminating coaxial cables. It is used to connect various types of radio, television, and other radio-frequency electronic equipment. (Also referred to as Bayonet Neill–Concelman connector.)</note></topic><topic id="44" parent="0" x="-58.93" y="286.45" text="Network Foundations"></topic><topic id="45" parent="44" x="44.45" y="182.23" text="Topology"><note>Ring topology:
devices connected by unidirectional transmission links
Bus topology:
In a simple bus topology, a single cable runs the entire length of the network. Nodes are attached to the network through drop points on this cable.
2 types:
linear bus topology
has a single cable with nodes attached.
tree topology
has branches from the single cable, and each branch can contain many nodes.
Star topology:
all nodes connect to a central device such as a switch. It enables the network to be more resilient and not as affected if an individual node experiences a problem.
Mesh topology:
- full mesh topology
every node is directly connected to every other node, which provides a great degree of redundancy.
- partial mesh topology
every node is not directly connected. The Internet is an example of a partial mesh topology.</note></topic><topic id="46" parent="44" x="-42.42" y="173.12" text="Media Access\Ntechnology"><note>Media access technologies work at the data link layer of the OSI model.
The data link layer is actually made up of a MAC sublayer and an LLC sublayer. These media access technologies live at the MAC layer and have to interface with the LLC layer. These media access technologies carry out the framing functionality of a network stack, which prepares each packet for network transmission. These technologies differ in network capabilities, transmission speed, and the physical medium they interact with.</note></topic><topic id="47" parent="46" x="-145.68" y="128.78" text="LAN"><note>When two distinct LANs are connected by a router, the result is an internetwork, not a larger LAN. Each distinct LAN has its own addressing scheme, broadcast domain, and communication mechanisms. If two LANs are connected by a different data link layer technology, such as frame relay or ATM, they are considered a WAN.</note></topic><topic id="48" parent="47" x="-230.43" y="100.74" text="Ethernet\NIEEE 802.3"><note>Ethernet is a resource-sharing technology that enables several devices to communicate on the same network. Ethernet usually uses a bus or star topology.
- Defined by standard IEEE 802.3
- Uses the carrier sense multiple access with collision detection (CSMA/CD) access method
- Uses broadcast and collision domains
- Supports full duplex communication
- Can use coaxial, twisted-pair, or fiber-optic cabling types
10Base2, ThinNet, Coaxial,10 Mbps
10Base5, ThickNet,Coaxial,10 Mbps
10Base-T,UTP,10 Mbps
100Base-TX, Fast Ethernet,UTP,100 Mbps
1000Base-T, Gigabit Ethernet,UTP,1,000 Mbps
1000Base-X,Fiber, 1,000 Mbps</note></topic><topic id="49" parent="47" x="-227.14" y="153.24" text="Token Ring\NIEEE 802.5"><note>Originally developed by IBM and then defined by the IEEE 802.5 standard.
It uses a token-passing technology with a star-configured topology.
Signals travel in a logical ring. Each computer is connected to a central hub, called a Multistation Access Unit (MAU).
Physically, the topology can be a star, but the signals and transmissions are passed in a logical ring.</note></topic><topic id="50" parent="47" x="-142.06" y="72.49" text="FDDI\NIEEE 802.4"><note>Fiber Distributed Data Interface (FDDI) technology, developed by the American National Standards Institute (ANSI), is a high-speed, token-passing, media access technology.
FDDI can be employed for distances up to 100 kilometers.
It enables several tokens to be present on the ring at the same time, causing more communication to take place simultaneously.
Ring topologies are considered deterministic, meaning that the rate of the traffic flow can be predicted. This can be beneficial for time-sensitive applications.
FDDI has a data transmission speed of up to 100 Mbps and is usually used as a backbone network using fiber-optic cabling. FDDI also provides fault tolerance by offering a second counter-rotating fiber ring. The primary ring has data traveling clockwise and is used for regular data transmission. The second ring transmits data in a counterclockwise fashion and is invoked only if the primary ring goes down. Sensors watch the primary ring and, if it goes down, invoke a ring wrap so the data will be diverted to the second ring.
Each node on the FDDI network has relays that are connected to both rings, so if a break in the ring occurs, the two rings can be joined.</note></topic><topic id="51" parent="50" x="-50.38" y="41.31" text="Devices"><note>Single-attachment station (SAS)
Attaches to only one ring (the primary) through a concentrator
Dual-attachment station (DAS)
Has two ports and each port provides a connection for both the primary and the secondary rings
Single-attached concentrator (SAC) Concentrator that connects an SAS device to the primary ring
Dual-attached concentrator (DAC) Concentrator that connects DAS, SAS, and SAC devices to both rings</note></topic><topic id="52" parent="50" x="-55.89" y="84.18" text="CDDI"><note>Copper Distributed Data Interface (CDDI), can work over UTP cabling. (FDDI over copper)</note></topic><topic id="53" parent="46" x="-308.17" y="229.43" text="Media Sharing"><note>When there is just one transmission medium (i.e., UTP cable) that has to be shared by all nodes and devices in a network, this is referred to as a contention-based environment. Each system has to “compete” to use the transmission line, which can cause contention.</note></topic><topic id="54" parent="53" x="-404.06" y="263.47" text="Token Passing"><note>A token is a 24-bit control frame used to control which computers communicate at what intervals. The token is passed from computer to computer, and only the computer that has the token can actually put frames onto the wire.
The token contains the data to be transmitted and source and destination address information.
Each computer checks this message to determine whether it is addressed to it, which continues until the destination computer receives the message. The destination computer makes a copy of the message and flips a bit to tell the source computer it did indeed get its message. Once this gets back to the source computer, it removes the frames from the network. The destination computer makes a copy of the message, but only the originator of the message can remove the message from the token and the network.
If a computer that receives the token does not have a message to transmit, it sends the token to the next computer on the network. An empty token has a header, data field, and trailer, but a token that has an actual message has a new header, destination address, source address, and a new trailer.</note></topic><topic id="55" parent="53" x="-359.44" y="189.36" text="CSMA"><note>A transmission is called a carrier, so if a computer is transmitting frames, it is performing a carrier activity. When computers use the carrier sense multiple access with collision detection (CSMA/CD) protocol, they monitor the transmission activity, or carrier activity, on the wire so they can determine when would be the best time to transmit data.</note></topic><topic id="56" parent="55" x="-389.74" y="148.54" text="CD"><note>Ethernet uses CSMA\CD
When using the CSMA/CD access method, computers listen for the absence of a carrier tone on the cable, which indicates that no other system is transmitting data.
A collision happens when two or more frames collide, which most likely corrupts both frames. If a computer puts frames on the wire and its frames collide with another computer’s frames, it will abort its transmission and alert all other stations that a collision just took place. All stations will execute a random collision timer to force a delay before they attempt to transmit data. This random collision timer is called the back-off algorithm.
Collisions are usually reduced by dividing a network with routers or switches.</note></topic><topic id="57" parent="55" x="-417.83" y="209.76" text="CA"><note>Wi-Fi uses CSMA\CA
Carrier sense multiple access with collision avoidance (CSMA/CA)
each computer signals its intent to transmit data before it actually does so. This tells all other computers on the network not to transmit data right now because doing so could cause a collision.
Each system will wait a period of time before attempting to transmit data to ensure collisions do not take place. The wireless LAN technology 802.11 uses CSMA/CA for its media access functionality.</note></topic><topic id="58" parent="53" x="-259.03" y="274.30" text="Collision Domains"><note>A collision domain is a group of computers that are contending, or competing, for the same shared communication medium.
If the same subnet is divided by bridges, the bridges can enable the broadcast traffic to pass between the different parts of a subnet, but not the collisions. This is how collision domains are formed. Isolating collision domains reduces the amount of collisions that take place on a network and increases its overall performance.
Another benefit of restricting and controlling broadcast and collision domains is that it makes sniffing the network and obtaining useful information more difficult for an intruder as he traverses the network.</note></topic><topic id="59" parent="53" x="-235.64" y="200.90" text="Polling"><note>mainframe media access technology uses polling
Polling is media-sharing method where some systems are configured as primary stations and others are configured as secondary stations. At predefined intervals, the primary station asks the secondary station if it has anything to transmit. This is the only time a secondary station can communicate.</note></topic><topic id="60" parent="44" x="-314.18" y="319.81" text="Transmission Methods"></topic><topic id="61" parent="60" x="-425.97" y="323.42" text="Unicast\NBroadcast\NMulticast"><note>Unicast - from the source computer to one particular system
Multicast - the sending system uses this method, when needs to send to a specific group of systems.
IPv4 multicast protocols use a Class D address
Broadcast - If a system wants all computers on its subnet to receive a message, it will use this method.
How does a server multicast to one particular computer on a specific network and no other networks in between?
The user who elects to receive a multicast actually has to tell his local router he wants to get frames with this particular multicast address passed his way. The local router must tell the router upstream, and this process continues so each router between the source and destination knows where to pass this multicast data.</note></topic><topic id="62" parent="61" x="-498.94" y="307.79" text="IGMP"><note>Internet Group Management Protocol (IGMP)
is used to report multicast group memberships to routers.
Version 1:
multicast agents periodically send queries to systems on the network they are responsible for and update their databases, indicating which system belongs to which group membership.
Version 2 :
provides more granular query types and allows a system to signal to the agent when it wants to leave a group.
Version 3 :
allows the systems to specify the specific sources it wants to receive multicast traffic from.
The previous statements are true pertaining to IPv4. IPv6 handles multicasting differently compared to IPv4.</note></topic><topic id="63" parent="44" x="-538.28" y="416.66" text="Network Protocols\Nand Services"></topic><topic id="64" parent="63" x="-625.26" y="414.69" text="ARP"><note>MAC and IP addresses must be properly mapped so they can be correctly resolved. This happens through the Address Resolution Protocol (ARP). When the data link layer receives a frame, the network layer has already attached the destination IP address to it, but the data link layer cannot understand the IP address and thus invokes ARP for help. ARP broadcasts a frame requesting the MAC address that corresponds with the destination IP address. Each computer on the subnet receives this broadcast frame, and all but the computer that has the requested IP address ignore it. The computer that has the destination IP address responds with its MAC address. Now ARP knows what hardware address corresponds with that specific IP address. The data link layer takes the frame, adds the hardware address to it, and passes it on to the physical layer, which enables the frame to hit the wire and go to the destination computer. ARP maps the hardware address and associated IP address and stores this mapping in its table for a predefined amount of time. This caching is done so that when another frame destined for the same IP address needs to hit the wire, ARP does not need to broadcast its request again. It just looks in its table for this information.</note></topic><topic id="65" parent="64" x="-702.72" y="414.75" text="ARP table\Ncache\Npoisoning"><note>If the attacker modifies the MAC tables in Bob’s and Alice’s systems and maps his MAC address to their IP addresses, all traffic can be sent to his system without Bob and Alice being aware of it.
So ARP is critical for a system to communicate, but it can be manipulated to allow trafffic to be sent to unintended systems. ARP is a rudimentary protocol and does not have any security measures built in to protect itself from these types of attacks. Networks should have IDS sensors monitoring for this type of activity so that administrators can be alerted if this type of malicious activity is underway.</note></topic><topic id="66" parent="63" x="-705.20" y="485.10" text="DHCP"><note>Dynamic Host Configuration Protocol
UDP-based protocol that allows servers to assign IP addresses to network clients.
1. the client computer broadcasts a DHCPDISCOVER message on the network in search of the DHCP server.
2.Once the respective DHCP server receives the DHCPDISCOVER request, the server responds with a DHCPOFFER packet, offering the client an IP address.
3. Once the client receives the settings sent by the server through the DHCPOFFER, it responds to the server with a DHCPREQUEST packet confirming its acceptance of the allotted settings.
4.The server now acknowledges with a DHCPACK packet, which includes the validity period (lease) for the allocated parameters.</note></topic><topic id="67" parent="66" x="-746.06" y="532.30" text="DHCP Snooping"><note>DHCP snooping (on network switches) ensures that DHCP servers can assign IP addresses to only selected systems, identified by their MAC addresses. Also, advance network switches now have capability to direct clients toward legitimate DHCP servers to get IP addresses and restrict rogue systems from becoming DHCP servers on the network.</note></topic><topic id="68" parent="63" x="-564.26" y="527.52" text="RARP"><note>Reverse Address Resolution Protocol (RARP) frames go to all systems on the subnet, but only the RARP server responds. Once the RARP server receives this request, it looks in its table to see which IP address matches the broadcast hardware address. The server then sends a message that contains its IP address back to the requesting computer. The system now has an IP address and can function on the network.
Diskless workstations do not have a full operating system but have just enough code to know how to boot up and broadcast for an IP address, and they may have a pointer to the server that holds the operating system. The diskless workstation knows its hardware address, so it broadcasts this information so that a listening server can assign it the correct IP address.</note></topic><topic id="69" parent="63" x="-634.23" y="507.33" text="BOOTP"><note>The Bootstrap Protocol (BOOTP) was created after RARP to enhance the functionality that RARP provides for diskless workstations. The diskless workstation can receive its IP address, the name server address for future name resolutions, and the default gateway address from the BOOTP server. BOOTP usually provides more functionality to diskless workstations than does RARP.
The evolution of this protocol has unfolded as follows: RARP evolved into BOOTP, which evolved into DHCP.</note></topic><topic id="70" parent="63" x="-507.92" y="525.57" text="ICMP"><note>The Internet Control Message Protocol (ICMP) delivers status messages, reports errors, replies to certain requests, reports routing information, and is used to test connectivity and troubleshoot problems on IP networks.
The most commonly understood use of ICMP is through the use of the ping utility. When a person wants to test connectivity to another system, he may ping it, which sends out ICMP ECHO REQUEST frames. The replies on his screen that are returned to the ping utility are called ICMP ECHO REPLY frames and are responding to the ECHO REQUEST frames. If a reply is not returned within a predefined time period, the ping utility sends more ECHO REQUEST frames. If there is still no reply, ping indicates the host is unreachable.
ICMP also indicates when problems occur with a specific route on the network and tells surrounding routers about better routes to take based on the health and congestion of the various pathways. Routers use ICMP to send messages in response to packets that could not be delivered. The router selects the proper ICMP response and sends it back to the requesting host, indicating that problems were encountered with the transmission request.
ICMP is used by other connectionless protocols, not just IP, because connectionless protocols do not have any way of detecting and reacting to transmission errors, as do connection-oriented protocols. In these instances, the connectionless protocol may use ICMP to send error messages back to the sending system to indicate networking problems.</note></topic><topic id="71" parent="70" x="-386.66" y="558.61" text="Ping of Death"><note>The Ping of Death attack is based upon the use of oversized ICMP packets. If a system does not know how to handle ICMP packets over the common size of 65,536 bytes, then it can become unstable and freeze or crash.</note></topic><topic id="72" parent="70" x="-470.58" y="576.22" text="Smurf attack"><note>the attacker sends an ICMP ECHO REQUEST packet with a spoofed source address to a victim’s network broadcast address. This means that each system on the victim’s subnet receives an ICMP ECHO REQUEST packet. Each system then replies to that request with an ICMP ECHO REPLY packet to the spoof address provided in the packets—which is the victim’s address.</note></topic><topic id="73" parent="70" x="-558.11" y="575.43" text="Fraggle attack"><note>Fraggle uses the UDP protocol and Smurf uses the ICMP protocol.
They are both DDoS attacks that use spoofed source addresses and use unknowing systems to attack a victim computer.
The countermeasures to these types of attacks are to use firewall rules that only allow the necessary ICMP packets into the network and the use of IDS or IPS to watch for suspicious activities.</note></topic><topic id="74" parent="63" x="-442.35" y="508.80" text="SNMP"><note>Simple Network Management Protocol
- managing network IP devices
2 parts:
- Manager
is the server portion, which polls different devices to check status information. The server component also receives trap messages from agents and provides a centralized place to hold all network-wide information.
- Agent
is a piece of software that runs on a network device, which is commonly integrated into the operating system. The agent has a list of objects that it is to keep track of, which is held in a database-like structure called
the Management Information Base (MIB). An MIB is a logical grouping of managed objects that contain data used for specific management tasks and status checks.</note></topic><topic id="75" parent="74" x="-366.67" y="478.69" text="Trap"><note>The trap operation allows the agent to inform the manager of an event, instead of having to wait to be polled. For example, if an interface on a router goes down, an agent can send a trap message to the manager. This is the only way an agent can communicate with the manager without first being polled.</note></topic><topic id="76" parent="74" x="-356.48" y="511.87" text="Security issues"><note>SNMP is for good purposes (network management) and for bad purposes (target mapping, device reconfiguration)
community string is basically a password a manager uses to request data from the agent, and there are two main community strings with different levels of access: read-only and read-write.
the community strings are sent in cleartext in SNMP v1 and v2
The SNMP ports (161 and 162) should not be open to untrusted networks
version 3 has cryptographic functionality, which provides encryption, message integrity, and authentication security. So, SNMP v3 should be implemented</note></topic><topic id="77" parent="63" x="-415.72" y="444.08" text="DNS"><note>Domain Name System (DNS) A hierarchical distributed naming system for computers, services, or any resource connected to an IP-based network. It associates various pieces of information with domain names assigned to each of the participating entities.</note></topic><topic id="78" parent="77" x="-314.09" y="409.07" text="Zone transfer"><note>DNS zone transfer The process of replicating the databases containing the DNS data across a set of DNS servers.</note></topic><topic id="79" parent="77" x="-319.69" y="446.16" text="DNSSEC"><note>DNSSEC A set of extensions to DNS that provide to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attack types.</note></topic><topic id="80" parent="44" x="-432.27" y="633.70" text="E-mail services"></topic><topic id="81" parent="80" x="-526.35" y="641.95" text="SMTP"><note>Simple Mail Transfer Protocol (SMTP)
- message transfer agent, moves the message from the user’s computer to the mail server when the user clicks the Send button.
- Function also as a message transfer protocol between e-mail servers.
- SMTP is a message-exchange addressing standard, and most people are used to seeing its familiar addressing scheme: [email protected].
- works on top of the TCP</note></topic><topic id="82" parent="80" x="-510.69" y="681.55" text="POP"><note>Post Office Protocol
is an Internet mail server protocol that supports incoming and outgoing messages.
If a user is using POP, when he accesses his mail server to see if he has received any new messages, all messages are automatically downloaded to his computer.</note></topic><topic id="83" parent="80" x="-466.71" y="706.48" text="IMAP"><note>Internet Message Access Protocol
enables users to access mail on a mail server. IMAP provides all the functionalities of POP, but has more capabilities.
IMAP is a store-and-forward mail server protocol that is considered POP’s successor.</note></topic><topic id="84" parent="80" x="-416.84" y="705.25" text="SASL"><note>Simple Authentication and Security Layer
is a protocol-independent framework for performing authentication.
The use of SASL is not unique just to POP; other protocols, such as IMAP, Internet Relay Chat (IRC), Lightweight Directory Access Protocol (LDAP), and SMTP, can also use SASL and its functionality.</note></topic><topic id="85" parent="80" x="-364.14" y="679.15" text="Relaying"><note>Mail servers use a relay agent to send a message from one mail server to another.
Spammers will find mail servers on the Internet, or within company DMZs, that have loosely configured relaying mechanisms and use these servers to send their spam.</note></topic><topic id="86" parent="80" x="-316.45" y="632.92" text="Threats"></topic><topic id="87" parent="86" x="-225.81" y="601.82" text="E-mail spoofing"><note>is a technique used by malicious users to forge an e-mail to make it appear to be from a legitimate source.
E-mail spoofing is done by modifying the fields of e-mail headers, such as the From, Return-Path, and Reply-To fields, so the e-mail appears to be from a trusted source.
E-mail spoofing is caused by the lack of security features in SMTP.
E-mail spoofing can be mitigated in several ways.
- The SMTP server can be configured to prevent unauthenticated users from sending e-mails.
SMTP authentication (SMTP-AUTH) was developed to provide an access control mechanism.
- Sender Policy Framework (SPF), which is an e-mail validation system designed to prevent e-mail spam by detecting e-mail spoofing by verifying the sender’s IP address. SPF allows administrators to specify which hosts are allowed to send e-mail from a given domain by creating a specific SPF record in DNS. Mail exchanges use the DNS to check that mail from a given domain is being sent by a host sanctioned by that domain’s administrators.</note></topic><topic id="88" parent="86" x="-224.87" y="649.86" text="Spear phishing\NWhaling attack"><note>A spear phishing attack zeros in on specific people. So if an attacker wants your specific information because she wants to break into your bank account, she could gather information about you via Facebook, LinkedIn, or through other resources and create an e-mail from someone she thinks you will trust. A similar attack is called whaling. In a whaling attack an attacker usually identifies some “big fish” in an organization (CEO, CFO, COO, CSO) and targets them because they have access to some of the most sensitive data in the organization. The attack is finely tuned to achieve the highest likelihood of success.</note></topic><topic id="89" parent="44" x="-187.33" y="708.85" text="NAT"><note>Network address translation (NAT) The process of modifying IP address information in packet headers while in transit across a traffic routing device, with the goal of reducing the demand for public IP addresses.
The following lists current private IP address ranges:
10.0.0.0–10.255.255.255 Class A network
172.16.0.0–172.31.255.255 Class B networks
192.168.0.0–192.168.255.255 Class C networks</note></topic><topic id="90" parent="89" x="-263.41" y="710.12" text="Static mapping"><note>The NAT software has a pool of public IP addresses configured. Each private address is statically mapped to a specific public address. So computer A always receives the public address x, computer B always receives the public address y, and so on. This is generally used for servers that need to keep the same public address at all times.</note></topic><topic id="91" parent="89" x="-263.27" y="747.10" text="Dynamic mapping"><note>The NAT software has a pool of IP addresses, but instead of statically mapping a public address to a specific private address, it works on a first-come, first-served basis.
The balancing act is to estimate how many computers will most likely need to communicate outside the internal network at one time. This estimate is the number of public addresses the company purchases, instead of purchasing one public address for each computer.</note></topic><topic id="92" parent="89" x="-218.07" y="793.00" text="Port address\Ntranslation (PAT)"><note>The company owns and uses only one public IP address for all systems that need to communicate outside the internal network.
The NAT device has an IP address of 127.50.41.3. When computer A needs to communicate with a system on the Internet, the NAT device documents this computer’s private address and source port number (10.10.44.3; port 43,887). The NAT device changes the IP address in the computer’s packet header to 127.50.41.3, with the source port 40,000. When computer B also needs to communicate with a system on the Internet, the NAT device documents the private address and source port number (10.10.44.15; port 23,398) and changes the header information to 127.50.41.3 with source port 40,001. So when a system responds to computer A, the packet first goes to the NAT device, which looks up the port number 40,000 and sees that it maps to computer A’s real information. So the NAT device changes the header information to address 10.10.44.3 and port 43,887 and sends it to computer A for processing. A company can save a lot more money by using PAT, because the company needs to buy only a few public IP addresses, which are used by all systems in the network.</note></topic><topic id="93" parent="44" x="-83.05" y="778.06" text="Routing Protocols"></topic><topic id="94" parent="93" x="32.86" y="857.05" text="AS"><note>Individual networks on the Internet are referred to as autonomous systems (ASs). These ASs are independently controlled by different service providers and organizations. An AS is made up of routers, which are administered by a single entity and use a common Interior Gateway Protocol (IGP) within the boundaries of the AS. The boundaries of these ASs are delineated by border routers. These routers connect to the border routers of other ASs and run interior and exterior routing protocols. Internal routers connect to other routers within the same AS and run interior routing protocols. So, in reality, the Internet is just a network made up of ASs and routing protocols.</note></topic><topic id="95" parent="93" x="37.61" y="820.66" text="Dynamic"><note>dynamic routing protocol can discover routes and build a routing table. Routers use these tables to make decisions on the best route for the packets they receive. A dynamic routing protocol can change the entries in the routing table based on changes that take place to the different routes. When a router that is using a dynamic routing protocol finds out that a route has gone down or is congested, it sends an update message to the other routers around it. The other routers use this information to update their routing table, with the goal of providing efficient routing functionality.</note></topic><topic id="96" parent="93" x="26.67" y="785.80" text="Static"><note>A static routing protocol requires the administrator to manually configure the router’s routing table. If a link goes down or there is network congestion, the routers cannot tune themselves to use better routes.</note></topic><topic id="97" parent="93" x="33.92" y="748.91" text="Flapping"><note>Route flapping refers to the constant changes in the availability of routes.</note></topic><topic id="98" parent="93" x="39.72" y="710.91" text="Black hole"><note>If a router does not receive an update that a link has gone down, the router will continue to forward packets to that route, which is referred to as a black hole.</note></topic><topic id="99" parent="93" x="-162.16" y="862.13" text="Distance-vector"><note>Distance-vector routing protocols make their routing decisions based on the distance (or number of hops) and a vector (a direction). The protocol takes these variables and uses them with an algorithm to determine the best route for a packet.</note></topic><topic id="100" parent="99" x="-263.80" y="887.05" text="RIP"><note>Routing Information Protocol RIP is a standard that outlines how routers exchange routing table data and is considered a distance-vector protocol, which means it calculates the shortest distance between the source and destination.
It is considered a legacy protocol because of its slow performance and lack of functionality. It should only be used in small networks.
RIP version 1 has no authentication, and RIP version 2 sends passwords in cleartext or hashed with MD5.</note></topic><topic id="101" parent="99" x="-242.60" y="923.25" text="IGRP"><note>Interior Gateway Routing Protocol IGRP is a distance-vector routing protocol that was developed by, and is proprietary to, Cisco Systems. Whereas RIP uses one criterion to find the best path between the source and destination, IGRP uses five criteria to make a “best route” decision. A network administrator can set weights on these different metrics so that the protocol works best in that specific environment.</note></topic><topic id="102" parent="99" x="-190.05" y="938.27" text="EIGRP"><note>Enhanced Interior Gateway Routing Protocol EIGRP is a Cisco proprietary and advanced distance-vector routing protocol. It allows for faster router table updates than its predecessor IGRP and minimizes routing instability, which can occur after topology changes. Routers exchange messages that contain information about bandwidth, delay, load, reliability, and maximum transmission unit (MTU) of the path to each destination as known by the advertising router.</note></topic><topic id="103" parent="93" x="-69.49" y="860.34" text="Link-state"><note>Link-state routing protocols build a more accurate routing table because they build a topology database of the network. These protocols look at more variables than just the number of hops between two destinations. They use packet size, link speed, delay, network load, and reliability as the variables in their algorithms to determine the best routes for packets to take.</note></topic><topic id="104" parent="103" x="-92.18" y="916.54" text="OSPF"><note>Open Shortest Path First OSPF
uses link-state algorithms to send out routing table information. The use of these algorithms allows for smaller, more frequent routing table updates to take place. This provides a more stable network than RIP, but requires more memory and CPU resources to support this extra processing.
OSPF allows for a hierarchical routing network that has a backbone link connecting all subnets together. OSPF has replaced RIP in many networks today. Authentication can take place with cleartext passwords or hashed passwords, or you can choose to configure no authentication on the routers using this protocol.</note></topic><topic id="105" parent="103" x="-35.55" y="919.51" text="IS-IS"><note>Intermediate System to Intermediate System (IS-IS) Link-state protocol that allows each router to independently build a database of a network’s topology. Similar to the OSPF protocol, it computes the best path for traffic to travel. It is a classless and hierarchical routing protocol that is vendor neutral.</note></topic><topic id="106" parent="93" x="36.64" y="892.06" text="VRRP"><note>Virtual Router Redundancy Protocol VRRP is used in networks that require high availability where routers as points of failure cannot be tolerated. It is designed to increase the availability of the default gateway by advertising a “virtual router” as a default gateway. Two physical routers (primary and secondary) are mapped to one virtual router. If one of the physical routers fails, the other router takes over the workload.</note></topic><topic id="107" parent="93" x="-29.98" y="697.11" text="EGB"><note>The exterior routing protocols used by routers connecting different ASs are generically referred to as exterior gateway protocols</note></topic><topic id="108" parent="93" x="-40.39" y="658.04" text="BGP"><note>The Border Gateway Protocol (BGP) enables routers on different ASs to share routing information to ensure effective and efficient routing between the different AS networks. BGP is commonly used by Internet service providers to route data from one location to the next on the Internet.
BGP uses a combination of link-state and distance-vector routing algorithms. It creates a network topology by using its link-state functionality and transmits updates on a periodic basis instead of continuously, which is how distance-vector protocols work. Network administrators can apply weights to the different variables used by link-state routing protocols when determining the best routes. These configurations are collectively called the routing policy.</note></topic><topic id="109" parent="0" x="137.64" y="990.60" text="Network Devices"></topic><topic id="110" parent="109" x="-44.19" y="993.68" text="Repeater"><note>Repeaters work at the physical layer and are add-on devices for extending a network connection over a greater distance. The device amplifies signals because signals attenuate the farther they have to travel.
Repeaters can also work as line conditioners by actually cleaning up the signals. This works much better when amplifying digital signals than when amplifying analog signals, because digital signals are discrete units, which makes extraction of background noise from them much easier for the amplifier. If the device is amplifying analog signals, any accompanying noise often is amplified as well, which may further distort the signal.
A repeater does not work with addresses; it just forwards all signals it receives.</note></topic><topic id="111" parent="110" x="-116.71" y="1006.48" text="Hub"><note>A hub is a multiport repeater. A hub is often referred to as a concentrator because it is the physical communication device that allows several computers and devices to communicate with each other. A hub does not understand or work with IP or MAC addresses. When one system sends a signal to go to another system connected to it, the signal is broadcast to all the ports, and thus to all the systems connected to the concentrator.</note></topic><topic id="112" parent="109" x="-192.09" y="1093.48" text="Bridge"><note>It works at the data link layer and therefore works with MAC addresses. When a frame arrives at a bridge, the bridge determines whether or not the MAC address is on the local network segment. If the MAC address is not on the local network segment, the bridge forwards the frame to the necessary network segment.
A bridge is used to divide overburdened networks into smaller segments to ensure better use of bandwidth and traffic control. A bridge amplifies the electrical signal, as does a repeater, but it has more intelligence than a repeater and is used to extend a LAN and enable the administrator to filter frames so he can control which frames go where.
- Reads header information, but does not alter it
- Builds forwarding tables based on MAC addresses
- Uses the same network address for all ports
- Filters traffic based on MAC addresses
- Forwards broadcast packets
- Forwards traffic if a destination address is unknown to the bridge</note></topic><topic id="113" parent="112" x="-304.24" y="1069.24" text="Broadcast storm"><note>Because bridges can forward all traffic, they forward all broadcast packets as well. This can overwhelm the network and result in a broadcast storm, which degrades the network bandwidth and performance.</note></topic><topic id="114" parent="112" x="-310.17" y="1112.94" text="Local"><note>A local bridge connects two or more LAN segments within a local area, which is usually a building.</note></topic><topic id="115" parent="112" x="-292.82" y="1148.39" text="Remote"><note>A remote bridge can connect two or more LAN segments over a MAN by using telecommunications links. A remote bridge is equipped with telecommunications ports, which enable it to connect two or more LANs separated by a long distance and can be brought together via telephone or other types of transmission lines.</note></topic><topic id="116" parent="112" x="-222.48" y="1163.36" text="Translation"><note>A translation bridge is needed if the two LANs being connected are different types and use different standards and protocols. For example, consider a connection between a Token Ring network and an Ethernet network.</note></topic><topic id="117" parent="112" x="-131.00" y="1150.60" text="Forwarding\Ntable"></topic><topic id="118" parent="117" x="-70.95" y="1206.99" text="transparent\Nbridging"><note>If transparent bridging is used, a bridge starts to learn about the network’s environment as soon as it is powered on and as the network changes. It does this by examining frames and making entries in its forwarding table.
If the bridge receives a request to send a frame to a destination that is not in its forwarding table, it sends out a query frame on each network segment except for the source segment. The destination host is the only one that replies to this query. The bridge updates its table with this computer address and the port to which it is connected, and forwards the frame.</note></topic><topic id="119" parent="117" x="-152.31" y="1203.53" text="static paths"></topic><topic id="120" parent="117" x="-45.80" y="1161.37" text="STA"><note>Spanning Tree Algorithm (STA)
adds more intelligence to the bridges.
- ensures that frames do not circle networks forever,
- provides redundant paths in case a bridge goes down,
- assigns unique identifiers to each bridge,
- assigns priority values to these bridges, and
- calculates path costs
- enables an administrator to indicate whether he wants traffic to travel certain paths instead of others.</note></topic><topic id="121" parent="112" x="-85.44" y="1098.88" text="source routing"><note>The packets hold the forwarding information so they can find their way to their destination without needing bridges and routers to dictate their paths. If the computer wants to dictate its forwarding information, it sends out explorer packets that arrive at the destination computer. These packets contain the route information the packets had to take to get to the destination, including what bridges and/or routers they had to pass through.
The destination computer then sends these packets back to the source computer, and the source computer strips out the routing information, inserts it into the packets, and sends them on to the destination.</note></topic><topic id="122" parent="121" x="1.88" y="1117.80" text="Caution"><note>External devices and border routers should not accept packets with source routing information within their headers, because that information will override what is laid out in the forwarding and routing tables configured on the intermediate devices. You want to control how traffic traverses your network; you don’t want packets to have this type of control and be able to go wherever they want. Source routing can be used by attackers to get around certain bridge and router filtering rules.</note></topic><topic id="123" parent="109" x="145.55" y="1122.32" text="Switch"><note>Switches combine the functionality of a repeater and the functionality of a bridge. A switch amplifies the electrical signal, like a repeater, and has the built-in circuitry and intelligence of a bridge.
When a frame comes to a hub, the hub sends the frame out through all of its ports. When a frame comes to a bridge, the bridge sends the frame to the port to which the destination network segment is connected. When a frame comes to a switch, the switch sends the frame directly to the destination computer or network, which results in a reduction of traffic.
When switches are used, contention and collisions are not issues, which results in more efficient use of the network’s bandwidth and decreased latency.</note></topic><topic id="124" parent="123" x="133.20" y="1169.99" text="L2"><note>Basic switches work at the data link layer and forward traffic based on MAC addresses</note></topic><topic id="125" parent="123" x="185.12" y="1171.65" text="L3&L4"><note>These switches are referred to as multilayered switches because they combine data link layer, network layer, and other layer functionalities.
A layer 3 switch is basically a router on steroids because it moves the route lookup functionality to the more efficient switching hardware level.(ASIC)</note></topic><topic id="126" parent="125" x="228.43" y="1225.64" text="Tags"><note>Layer 3 and 4 switches can use tags, which are assigned to each destination network or subnet. When a packet reaches the switch, the switch compares the destination address with its tag information base, which is a list of all the subnets and their corresponding tag numbers. The switch appends the tag to the packet and sends it to the next switch. All the switches in between this first switch and the destination host just review this tag information to determine which route it needs to take, instead of analyzing the full header. Once the packet reaches the last switch, this tag is removed and the packet is sent to the destination. This process increases the speed of routing of packets from one location to another.
Multiprotocol Label Switching (MPLS)</note></topic><topic id="127" parent="125" x="179.46" y="1226.81" text="VLAN"><note>enable administrators to separate and group computers logically</note></topic><topic id="128" parent="127" x="172.73" y="1292.28" text="Hopping attack"><note>VLAN hopping attacks allow attackers to gain access to traffic in various VLAN segments. An attacker can have a system act as though it is a switch.
The system understands the tagging values being used in the network and the trunking protocols and can insert itself between other VLAN devices and gain access to the traffic going back and forth.
Attackers can also insert tagging values to manipulate the control of traffic at the data link layer.</note></topic><topic id="129" parent="109" x="77.08" y="1123.25" text="Router"><note>Routers are layer 3, or network layer, devices that are used to connect similar or different networks.
A router splits up a network into collision domains and broadcast domains. A router gives more of a clear-cut division between network segments than repeaters or bridges. A router should be used if an administrator wants to have more defined control of where the traffic goes, because more sophisticated filtering is available with routers, and when a router is used to segment a network, the result is more controllable sections.
- Creates a new header for each packet
- Builds routing tables based on IP addresses
- Assigns a different network address per port
- Filters traffic based on IP addresses
- Does not forward broadcast packets
- Forwards traffic if a destination address is unknown to the bridge
A router discovers information about routes and changes that take place in a network through its routing protocols (RIP, BGP, OSPF, and others). These protocols tell routers if a link has gone down, if a route is congested, and if another route is more economical. They also update routing tables and indicate if a router is having problems or has gone down.</note></topic><topic id="130" parent="109" x="238.61" y="1126.25" text="Gateway"><note>Gateway is a general term for software running on a device that connects two different environments</note></topic><topic id="131" parent="109" x="323.73" y="1104.98" text="PBX"><note>A Private Branch Exchange (PBX) is a private telephone switch that is located on a company’s property. This switch performs some of the same switching tasks that take place at the telephone company’s central office. The PBX has a dedicated connection to its local telephone company’s central office, where more intelligent switching takes place.
Private Branch Exchange (PBX) A telephone exchange that serves a particular business, makes connections among the internal telephones, and connects them to the public-switched telephone network (PSTN) via trunk lines.</note></topic><topic id="132" parent="109" x="445.35" y="1086.16" text="Firewall"></topic><topic id="133" parent="132" x="526.65" y="1131.19" text="Types"></topic><topic id="134" parent="133" x="364.61" y="1264.82" text="Packet filtering"><note>The first generation of firewalls,
also known as stateless inspection because the device does not understand the context that the packets are working within.
Packet filtering is a firewall technology that makes access decisions based upon network-level protocol header values. The device that is carrying out packet filtering processes is configured with ACLs, which dictate the type of traffic that is allowed into and out of specific networks.
The filters only have the capability of reviewing protocol header information at the network and transport levels.
This means the filters can make access decisions based upon the following basic criteria:
- Source and destination IP addresses
- Source and destination port numbers
- Protocol types
- Inbound and outbound traffic direction
Packet filtering is commonly carried out at the edge of a network to strip out all of the obvious “junk” traffic.</note></topic><topic id="135" parent="134" x="306.38" y="1312.84" text="Cons"><note>- They cannot prevent attacks that employ application-specific vulnerabilities or functions.
- The logging functionality present in packet filtering firewalls is limited.
- Most packet filtering firewalls do not support advanced user authentication schemes.
- Many packet filtering firewalls cannot detect spoofed addresses.
- They may not be able to detect packet fragmentation attacks.</note></topic><topic id="136" parent="134" x="357.49" y="1313.04" text="Pros"><note>packet filtering firewalls are scalable,
they are not application dependent, and they have high performance because they do not carry out extensive processing on the packets.
They are commonly used as the first line of defense to strip out all the network traffic that is obviously malicious or unintended for a specific network.</note></topic><topic id="137" parent="133" x="682.67" y="1276.62" text="Dynamic packet filtering"></topic><topic id="138" parent="133" x="464.53" y="1264.40" text="Stateful"><note>- Maintains a state table that tracks each and every communication session
- Provides a high degree of security and does not introduce the performance hit that application proxy firewalls introduce
- Is scalable and transparent to users
- Provides data for tracking connectionless
protocols such as UDP and ICMP
- Stores and updates the state and context of the data within the packets</note></topic><topic id="139" parent="133" x="736.23" y="1202.28" text="Kernel proxy"></topic><topic id="140" parent="133" x="575.83" y="1277.31" text="Proxy"></topic><topic id="141" parent="132" x="538.54" y="1060.42" text="Architecture"></topic><topic id="142" parent="141" x="665.04" y="1075.67" text="Screened host"></topic><topic id="143" parent="141" x="656.65" y="1130.58" text="Multihome"></topic><topic id="144" parent="141" x="660.32" y="1016.27" text="Screened subnet"></topic><topic id="145" parent="109" x="344.21" y="1003.09" text="Proxy"></topic><topic id="146" parent="109" x="310.72" y="963.31" text="Honeypot"></topic><topic id="147" parent="0" x="442.45" y="889.24" text="Intranets and Extranets"></topic><topic id="148" parent="0" x="841.55" y="842.42" text="Metropolitan\NArea Networks"></topic><topic id="149" parent="0" x="648.20" y="875.66" text="Wide Area Networks"></topic><topic id="150" parent="0" x="948.86" y="711.88" text="Remote Connectivity"></topic><topic id="151" parent="0" x="786.38" y="596.99" text="Wireless Technologies"></topic></topics><relations><relation source="68" target="69"></relation><relation source="69" target="66"></relation></relations></mindmap></simplemind-mindmaps> | {
"repo_name": "ft44k/CISSP",
"stars": "30",
"repo_language": "None",
"file_name": "Domain 2 Access Control.smmx",
"mime_type": "text/xml"
} |
<?xml version="1.0" encoding="UTF-8"?>
<simplemind-mindmaps doc-version="3" generator="SimpleMindTouch" gen-version="1.8.0" device-type="ipad"><mindmap><meta><guid guid="ED185095C8AB4A0489136916"></guid><title text="Domain 8\NLegal, Regulations, Investigations, and Compliance"></title><page><visual-area x="-383.29" y="0.00" width="1517.77" height="948.05"></visual-area></page><style key="system.spring-levels"></style><auto-numbering style="disabled"></auto-numbering><scrollstate zoom="180" x="283.71" y="821.00"></scrollstate><selection type="node" id="76"></selection><main-centraltheme id="0"></main-centraltheme></meta><topics><topic id="0" parent="-1" x="500.00" y="500.00" text="Domain 8\NLegal, Regulations, Investigations, and Compliance"></topic><topic id="1" parent="0" x="797.97" y="430.18" text="Complexities in\NCybercrime"></topic><topic id="2" parent="1" x="958.84" y="421.97" text="Council of Europe\NConvention on Cybercrime"><note>Attempt to create international response to cybercrime</note></topic><topic id="3" parent="1" x="917.09" y="370.93" text="OECD"><note>Organization for Economic Co-Operation and Development
Guidelines on the protection of privacy and Transborder Flows of Personal Data rules.</note></topic><topic id="4" parent="1" x="944.61" y="479.23" text="European Union\NPrinciples on Privacy"><note>This is set of principles addresses using and transmitting information considered private in nature.</note></topic><topic id="5" parent="4" x="1093.48" y="489.89" text="Safe Harbor"><note>Helps US companies comply with EU privacy principles.
Rules:
1. Notice
Individuals must be informed that their data is being collected and how it will be used
2. Choice
Individuals must have choice to opt out of the collection
3. Onward transfer
Transfer of data to third parties may only occur to other organizations that follow adequate data protection principles
4. Security
Reasonable efforts must be made to prevent loss of collected data
5. Data integrity
Data must be relevant and reliable for the purpose it was collected for
6. Access
Individuals must be able to access information held about them, and correct or delete it if it is inaccurate
7. Enforcement
There must be effective means of enforcing these rules</note></topic><topic id="6" parent="4" x="1057.33" y="538.81" text="Data Protection Directive"><note>The principles and how they are to be followed</note></topic><topic id="7" parent="1" x="917.64" y="317.85" text="Import/Export\Nrequirements"></topic><topic id="8" parent="7" x="976.02" y="263.05" text="Wassenaar Arrangement"><note>The Wassenaar Arrangement (full name: The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies) is a multilateral export control regime (MECR) with 41 participating states including many former COMECON (Warsaw Pact) countries.
It is the successor to the Cold War-era Coordinating Committee for Multilateral Export Controls (COCOM), and was established on 12 July 1996, in Wassenaar, the Netherlands, which is near The Hague. The Wassenaar Arrangement is considerably less strict than COCOM, focusing primarily on the transparency of national export control regimes and not granting veto power to individual members over organizational decisions. A Secretariat for administering the agreement is located in Vienna, Austria. Like COCOM, however, it is not a treaty, and therefore is not legally binding.</note></topic><topic id="9" parent="7" x="1007.24" y="318.23" text="Import"><note>Some countries like China, Russia, Iran, Iraq have cryptographic import restrictions...</note></topic><topic id="10" parent="1" x="786.55" y="239.06" text="Legal systems"></topic><topic id="11" parent="10" x="782.63" y="173.40" text="Civil Code Law"><note>Rule based not precedence based.
Lower courts are not compelled to follow the decisions made by higher courts</note></topic><topic id="12" parent="10" x="878.31" y="175.62" text="Common Law "><note>Developed in England
Based on previous interpretation of laws
Today, common law uses judges and juries of peers.
If the jury trial is waived, the judge decides the facts.
Criminal => jail
Civil/tort => financial restitution, community service
Administrative => deals with regulatory standards</note></topic><topic id="13" parent="10" x="679.09" y="175.93" text="Religious law"><note>Based on religious beliefs of the region
Cover all aspects of human life
Law, in the religious sense, also include codes of ethics and morality, which are upheld and required by God.
Hindu law
Sharia law - Islamic
Halakha - jewish</note></topic><topic id="14" parent="10" x="680.08" y="219.65" text="Mixed law"><note>Two or more law systems are used together and apply cumulatively or interactively
Most often consist of civil and common law
Holland , Canada, South Africa</note></topic><topic id="15" parent="10" x="681.19" y="261.32" text="Customary"><note>Deals mainly with personal conduct and patterns of behavior
Based on traditions and customs of the region</note></topic><topic id="16" parent="0" x="598.63" y="387.40" text="Intellectual Property Laws"></topic><topic id="17" parent="16" x="449.14" y="313.58" text="Trade Secret"><note>Protects certain type of information or resource from unauthorized use or disclosure.
Companies use NDA where employees confirm that they understand its content and promise not to share the company's trade secrets</note></topic><topic id="18" parent="16" x="584.14" y="314.69" text="Copyright"><note>Protects the right of an author to control the public distribution, reproduction,display, and adaptation of the original work</note></topic><topic id="19" parent="18" x="574.62" y="236.81" text="Digital Millennium\NCopyright Act"><note>US law that criminalizes the production and dissemination of technologies, devices, or services that circumvent access control measures that are put into place to protect copyright material.</note></topic><topic id="20" parent="18" x="453.85" y="234.91" text="Copyright directive"><note>European version of DMCA</note></topic><topic id="21" parent="16" x="668.98" y="315.44" text="Trademark"><note>Protects a word, symbol, sound, shape, color, or combination of these
WIPO - World Intellectual Property Organization is the agency of the UN, oversees registration</note></topic><topic id="22" parent="16" x="523.59" y="313.05" text="Patent"><note>Patents are given to individuals or companies to grant them legal ownership of, and enable them to exclude others from using or copying, he invention covered by the patent.
Patent is up usually 20 years
It is the strongest form of intellectual property protection.</note></topic><topic id="23" parent="0" x="210.41" y="216.40" text="Privacy"></topic><topic id="24" parent="23" x="299.37" y="193.87" text="PII"><note>Personally Identifiable Information
is data that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual.
- full name
- national ID
- IP address
- vehicle reg number
- drivers license
- face, fingerprint or handwriting
- credit card numbers
- digital identity
- birthday
- birthplace
- genetic information</note></topic><topic id="25" parent="23" x="297.27" y="143.13" text="REP"><note>Reasonable expectation of privacy
If it is not specifically explained to an employee that monitoring is possible and or probable, when the monitoring takes place he could claim that his privacy rights have been violated</note></topic><topic id="26" parent="23" x="100.60" y="170.91" text="Government regulations"></topic><topic id="27" parent="26" x="-42.10" y="157.28" text="SOX"><note>Sarbanes-Oxley act
Horizontal regulation
Was created in the wake of corporate scandals and fraud.
Requirements how companies must track , manage, and report on financial information.
Processes and controls must be in place to protect the data stored on computers.
Failure to comply can lead to financial penalties and jail for executives.</note></topic><topic id="28" parent="26" x="32.89" y="118.66" text="HIPAA"><note>Healy insurance Portability and Accountability Act
Vertical regulation
Procedures for storage, use, and transmission of personal medical information</note></topic><topic id="29" parent="26" x="52.07" y="246.20" text="GLBA"><note>Gramm-Leach-Bliley Act
Vertical regulation
Requires financial institutions to develop privacy notices and give their customers the option to prohibit financial institutions from sharing their information with nonaffiliated 3th parties.</note></topic><topic id="30" parent="26" x="87.28" y="87.91" text="Basel II"><note>System for establishing the minimum amount of capital that financial institution are required to keep on hand.</note></topic><topic id="31" parent="26" x="-65.58" y="201.22" text="Federal Privacy Act"><note>Applies to records and documents developed by specific branches of the federal government.
It says that agency cannot disclose information without written permission from the individual.
So agencies can gather only relevant informations about individuals and share this information only with approval.</note></topic><topic id="32" parent="26" x="107.71" y="217.84" text="FISMA"><note>Federal Information Security Management Act
Law that requires every federal agency to create, document, and implement an agency-wide security program to provide protection for the information
It requires to conduct annual reviews of the security program and report the result to Office of Management and Budget OMB</note></topic><topic id="33" parent="26" x="-105.21" y="112.09" icon="computer" text="Computer fraud and abuse act"><note>Amended by USA Patriot act and by Identity Theft Enforcement and Restitution Act
It is the primary US antihacking statute.</note></topic><topic id="34" parent="26" x="-5.50" y="32.62" text="Economic Espionage act"><note>Provides structure for dealing with these types of cases and further defines trade secret to be technical, business, engineering, scientific, financial.
This act enables FBI to investigate industrial and corporate espionage cases.</note></topic><topic id="35" parent="26" x="-38.65" y="244.20" text="Patriot Act"><note>Reduced restriction on law enforcement agencies
Expanded the definition of terrorism to include domestic terrorism
Expanded possibility to regulate financial transactions</note></topic><topic id="36" parent="26" x="142.97" y="122.58" text="PIPEDA"><note>Personal Information Protection and Electronic Document Act
Canadian law that deals with protection of personal information</note></topic><topic id="37" parent="23" x="228.50" y="114.02" text="Self-regulation"></topic><topic id="38" parent="37" x="224.65" y="57.26" text="PCI DSS"><note>Credit card companies joined forces and devised the Payment Card Industry Data Security Standard
Minnesota mandate PCI DSS as a law => jail
In other areas it may lead to financial penalties only
This applies to any entity that process, transmits, stores, or accepts credit card data.
12 main requirement in 6 major categories
- Build and maintain a Secure Network
- Protect Card holder data
- Maintain a Vulnerability Management Program
- Implement Strong Access Control Measures
- Test and monitor networks
- Maintain an Information Security Policy</note></topic><topic id="39" parent="0" x="106.41" y="378.62" text="Liability and its\NRamnifications"></topic><topic id="40" parent="39" x="71.55" y="299.36" text="Due diligence"><note>Means that the company properly investigated all of its possible weaknesses and vulnerabilities
So it is the act of gathering information</note></topic><topic id="41" parent="39" x="153.18" y="297.50" text="Due care"><note>Means that a company did all it could have reasonably done, under the circumstances, to prevent security breaches, and also took reasonable steps to ensure that if a security breach did take place, proper controls or countermeasures were in place to mitigate the damages.</note></topic><topic id="42" parent="39" x="-14.98" y="318.60" text="SAS 70"><note>a Statement on auditing standards no.70 service organizations
Is an audit that is carried out by a third party to assess the internal controls of a service organization</note></topic><topic id="43" parent="39" x="-31.01" y="369.27" text="Downstream liability"><note>Company B can sue company A for being negligent ( virus from A to B)</note></topic><topic id="44" parent="39" x="-39.98" y="422.03" text="Legally\Nrecognized\Nobligation"><note>Duty to protect an asset</note></topic><topic id="45" parent="39" x="-42.24" y="474.15" text="Proximate causation"><note>The result of the negligence..</note></topic><topic id="46" parent="0" x="-1.14" y="551.51" text="Compliance"></topic><topic id="47" parent="46" x="-225.79" y="555.30" text=".what laws and regulations we need to be compliant with\N.security framework\N.risk methodology\N.control objectives standard "></topic><topic id="48" parent="46" x="-128.38" y="643.39" text="GRC"><note>Governance risk and compliance
- allow for integration and alignment of the activities that take place in each of these silos of a security program</note></topic><topic id="49" parent="46" x="-48.07" y="652.96" text="KPI"><note>Key performance indicators
If the same KPI are used in governance, risk and compliance auditing activities, then the resulting report can effectively illustrate the overlap and integration of these different concepts.</note></topic><topic id="50" parent="0" x="263.86" y="642.40" text="Investigations"></topic><topic id="51" parent="50" x="144.93" y="779.36" text="Evidence"><note>Relevant - it must have a reasonable and sensible relationship to the findings
Complete - it must present the whole truth of an issue
Sufficient - it must be persuasive enough to convince a reasonable person of the validity of the evidence
Reliable - it must be consistent with facts. It is factual and not circumstantial
International Organization on Computer Evidence IOCE
Developed international principles how digital evidence is to be collected and handled</note></topic><topic id="52" parent="51" x="63.20" y="714.12" text="Best"><note>Is the primary evidence, provides most reliability
e.g. Originally signed contract</note></topic><topic id="53" parent="51" x="66.31" y="751.78" text="Secondary"><note>Secondary evidence is not viewed as reliable and strong in proving innocence or guilt (or liability in civil cases) when compared to best evidence.
Oral evidence, such as a witness’s testimony, and copies of original documents are placed in the secondary evidence category.</note></topic><topic id="54" parent="51" x="62.42" y="792.89" text="Direct"><note>Direct evidence can prove a fact all by itself and does not need backup information to refer to. When direct evidence is used, presumptions are not required. One example of direct evidence is the testimony of a witness who saw a crime take place.
Although this oral evidence would be secondary in nature, meaning a case could not rest on just it alone, it is also direct evidence, meaning the lawyer does not necessarily need to provide other evidence to back it up.
Direct evidence often is based on information gathered from a witness’s five senses.</note></topic><topic id="55" parent="51" x="74.09" y="840.11" text="Conclusive"><note>Conclusive evidence is irrefutable and cannot be contradicted. Conclusive evidence is very strong all by itself and does not require corroboration.</note></topic><topic id="56" parent="51" x="124.09" y="886.22" text="Circumstantial "><note>Circumstantial evidence can prove an intermediate fact that can then be used to deduce or assume the existence of another fact.
This type of fact is used so the judge or jury will logically assume the existence of a primary fact. For example, if a suspect told a friend he was going to bring down eBay’s web site, a case could not rest on that piece of evidence alone because it is circumstantial. However, this evidence can cause the jury to assume that because the suspect said he was going to do it, and hours later it happened, maybe he was the one who did the crime.</note></topic><topic id="57" parent="51" x="198.18" y="847.37" text="Corroborative"><note>Corroborative evidence is supporting evidence used to help prove an idea or point. It cannot stand on its own but is used as a supplementary tool to help prove a primary piece of evidence.</note></topic><topic id="58" parent="51" x="212.07" y="808.48" text="Opinion"><note>Opinion Evidence
When a witness testifies, the opinion rule dictates that she must testify to only the facts of the issue and not her opinion of the facts.
This is slightly different from when an expert witness is used, because an expert is used primarily for his educated opinion.
Most lawyers call in expert witnesses to testify and help the defending or prosecuting sides better understand the subject matter so they can help the judge and jury better understand the matters of the case.</note></topic><topic id="59" parent="51" x="225.96" y="770.70" text="Hearsay"><note>Hearsay evidence pertains to oral or written evidence presented in court that is secondhand and has no firsthand proof of accuracy or reliability. If a witness testifies about something he heard someone else say, it is too far removed from fact and has too many variables that can cloud the truth.
If business documents were made during regular business routines, they may be admissible. However, if these records were made just to be presented in court, they could be categorized as hearsay evidence.</note></topic><topic id="60" parent="50" x="382.71" y="653.25" text="Chain of custody\Nof evidence "><note>The primary reason for the chain of custody of evidence is to ensure that it will be admissible in court by showing it was properly controlled and handled before being presented in court
Evidence must be obtained legally and the chain of custody was not broken</note></topic><topic id="61" parent="60" x="353.72" y="701.20" text="Lifecycle"><note>Identification
Collection
Storage
Preservation
Transportation
Presentation
Return to owner</note></topic><topic id="62" parent="50" x="164.25" y="650.55" text="MOM"><note>Motive
Opportunity
Means
This is important when looking for suspect</note></topic><topic id="63" parent="50" x="111.74" y="615.92" text="Enticement"><note>Is act of luring an intruder and is legal</note></topic><topic id="64" parent="50" x="186.90" y="584.06" text="Entrapment"><note>Induces a crime, tricks a person, and is illegal</note></topic><topic id="65" parent="50" x="316.38" y="879.09" text="Incident response"></topic><topic id="66" parent="65" x="273.86" y="930.18" text="Triage"></topic><topic id="67" parent="65" x="345.79" y="926.66" text="Investigation"></topic><topic id="68" parent="65" x="438.45" y="921.93" text="Containment"></topic><topic id="69" parent="65" x="458.66" y="884.82" text="Analysis"></topic><topic id="70" parent="65" x="390.96" y="812.30" text="Tracking"></topic><topic id="71" parent="65" x="449.22" y="844.51" text="Recovery"></topic><topic id="72" parent="0" x="482.97" y="631.96" text="Ethics"></topic><topic id="73" parent="72" x="474.36" y="698.69" text="Computer Ethics Institute"></topic><topic id="74" parent="73" x="465.92" y="764.08" text="10 commandments"></topic><topic id="75" parent="72" x="617.27" y="704.93" text="The Internet\NArchitecture Board"><note>is the coordinating committee for Internet design, engineering, and management. It is responsible for the architectural oversight of the Internet Engineering Task Force (IETF) activities, Internet Standards Process oversight and appeal, and editor of Request for Comments (RFCs).</note></topic><topic id="76" parent="75" x="614.19" y="765.45" text="Unethical acts"><note>Purposely seeking to gain unauthorized access to Internet resources
Disrupting the intended use of the Internet
Wasting resources (people, capacity, and computers) through purposeful actions
Destroying the integrity of computer-based information
Compromising the privacy of others
Conducting Internet-wide experiments in a negligent manner</note></topic><topic id="77" parent="0" x="714.97" y="590.18" text="The crux of\Ncomputer crime\Nlaw"><note>The main issues addressed in computer crime law are:
- unauthorized modification, disclosure, destruction, or access and inserting malicious code</note></topic><topic id="78" parent="77" x="860.15" y="573.69" text="Computer-assisted crime"><note>Computer was used as a tool to help carry out a crime.</note></topic><topic id="79" parent="77" x="859.15" y="615.69" text="Computer-targeted crime"><note>Computer was the victim of an attack crafted to harm it (and it's owners)</note></topic><topic id="80" parent="77" x="817.12" y="663.10" text="Computer is incidental"><note>Eg was used to store some stolen data...</note></topic></topics><relations><relation source="47" target="48"></relation><relation source="48" target="49"></relation></relations></mindmap></simplemind-mindmaps> | {
"repo_name": "ft44k/CISSP",
"stars": "30",
"repo_language": "None",
"file_name": "Domain 2 Access Control.smmx",
"mime_type": "text/xml"
} |
<?xml version="1.0" encoding="UTF-8"?>
<simplemind-mindmaps doc-version="3" generator="SimpleMindTouch" gen-version="1.8.0" device-type="ipad"><mindmap><meta><guid guid="E9C35F94D2F693C7137121F8"></guid><title text="Domain 7\NBusiness Continuity and Disaster Recovery Planning"></title><page><visual-area x="-209.17" y="-191.95" width="1839.27" height="1057.68"></visual-area></page><style key="system.spring-levels"></style><auto-numbering style="disabled"></auto-numbering><scrollstate zoom="180" x="1360.83" y="477.05"></scrollstate><selection type="node" id="5"></selection><main-centraltheme id="0"></main-centraltheme></meta><topics><topic id="0" parent="-1" x="500.00" y="500.00" text="Domain 7\NBusiness Continuity and Disaster Recovery Planning"></topic><topic id="1" parent="0" x="825.06" y="498.23" text="Business Continuity and\NDisaster Recovery"><note>The goal of disaster recovery is to minimize the effects of a disaster or disruption.
=> resume operation in a timely manner after a disaster hit the business
Continuity planning provides methods and procedures for dealing with longer-term outages and disasters.</note></topic><topic id="2" parent="1" x="966.34" y="467.72" text="BCM"><note>Business continuity management (BCM) is the holistic management process.
The main objective of BCM is to allow the organization to continue to perform business operations under various conditions.</note></topic><topic id="3" parent="2" x="1040.75" y="460.28" text="BCP"><note>A business continuity plan (BCP) takes a broader approach to the problem. It is a plan how to get business back to its tracks.
A BCP provides procedures for emergency responses, extended backup operations, and post-disaster recovery.</note></topic><topic id="4" parent="3" x="1113.29" y="453.03" text="PR"><note>The BCP team should identify the individuals who will interact with external players, such as the reporters, shareholders, customers, and civic officials. Response to the disaster should be done quickly and honestly, and should be consistent with any other organizational response.</note></topic><topic id="5" parent="2" x="1036.39" y="414.98" text="DRP"><note>Disaster recovery plan (DRP) is carried out when everything is still in emergency mode.
It is a plan what to do immediately in case of emergency.
It should contain information about how to deal with:
- people
- sw & hw
- emergency procedures
- recovery procedures
- facility issues
- supplies</note></topic><topic id="6" parent="1" x="1055.43" y="625.59" text="Best practices"></topic><topic id="7" parent="6" x="1330.88" y="604.77" text="NIST 800-34"><note>Continuity Planning Guide for Information Technology Systems:
1. Develop the continuity planning policy statement. Write a policy that provides the guidance necessary to develop a BCP, and that assigns authority to the necessary roles to carry out these tasks.
2. Conduct the business impact analysis (BIA). Identify critical functions and systems and allow the organization to prioritize them based on necessity. Identify vulnerabilities and threats, and calculate risks.
3. Identify preventive controls. Once threats are recognized, identify and implement controls and countermeasures to reduce the organization’s risk level in an economical manner.
4. Develop recovery strategies. Formulate methods to ensure systems and critical functions can be brought online quickly.
5. Develop the contingency plan. Write procedures and guidelines for how the organization can still stay functional in a crippled state.
6. Test the plan and conduct training and exercises. Test the plan to identify deficiencies in the BCP, and conduct training to properly prepare individuals on their expected tasks.
7. Maintain the plan. Put in place steps to ensure the BCP is a living document that is updated regularly.</note></topic><topic id="8" parent="7" x="1251.67" y="694.46" text="Continuity\NPolicy"><note>- integrate law and regulation requirements
- define the scope, goals, roles
- management approves policy</note></topic><topic id="9" parent="7" x="1339.66" y="771.55" text="BIA"></topic><topic id="10" parent="7" x="1455.83" y="835.36" text="Identify\Npreventive\Ncontrols"><note>- implement controls
- mitigate risk</note></topic><topic id="11" parent="7" x="1594.60" y="818.11" text="Develop\Nrecovery\Nstrategies"></topic><topic id="12" parent="7" x="1554.82" y="714.75" text="Develop BCP"></topic><topic id="13" parent="7" x="1522.40" y="622.27" text="Exercise, test,drill"></topic><topic id="14" parent="7" x="1461.11" y="557.16" text="Maintain BCP"></topic><topic id="15" parent="6" x="966.00" y="680.73" text="ISO/IEC 27031:2011"><note>ISO/IEC 27031:2011 Guidelines for information and communications technology readiness for business continuity.
This ISO/IEC standard that is a component of the overall ISO/IEC 27000 series</note></topic><topic id="16" parent="6" x="1028.64" y="560.00" text="BS 25999"><note>The British Standards Institute’s (BSI) standard for business continuity management (BCM). This BS standard has two parts:
BS 25999-1:2006 Business Continuity Management Code of Practice General guidance that provides principles, processes, and terminology for BCM.
BS 25999-2:2007 Specification for Business Continuity Management Specifies objective, auditable requirements for executing, operating, and enhancing a BCM system.</note></topic><topic id="17" parent="6" x="1069.34" y="680.90" text="ISO 22301"><note>ISO 22301 Pending International Standard for business continuity management systems.
The specification document against which organizations will seek certification.
This standard will replace BS 25999-2.
The earliest it will be published is mid-2012.</note></topic><topic id="18" parent="6" x="1146.83" y="677.49" text="GPG"><note>Business Continuity Institute’s Good Practice Guidelines (GPG)
BCM best practices, which are broken down into the following management and technical practices:
Management Practices:
-- Policy and Program Management
-- Embedding BCM in the Organization’s Culture
Technical Practices:
-- Understanding the Organization
-- Determining BCM Strategy
-- Developing and Implementing a BCM Response
-- Exercising, Maintaining, and Reviewing</note></topic><topic id="19" parent="6" x="1102.77" y="563.56" text="DRI"><note>DRI International Institute’s Professional Practices for Business Continuity Planners
Best practices and framework to allow for BCM processes, which are broken down into the following sections:
- Program Initiation and Management
- Risk Evaluation and Control
- Business Impact Analysis
- Business Continuity Strategies
- Emergency Response and Operations
- Business Continuity Plans
- Awareness and Training Programs
- Business Continuity Plan Exercise, Audit, and Maintenance
- Crisis Communications
- Coordination with External Agencies</note></topic><topic id="20" parent="0" x="589.06" y="358.23" text="BCP Project Components"></topic><topic id="21" parent="20" x="626.97" y="297.88" text="Coordinator"><note>Leader of the BCP team and will oversee the development, implementation, and testing of the continuity and disaster recovery plans.</note></topic><topic id="22" parent="20" x="719.63" y="328.42" text="Committee"><note>Should be made up of representatives from all department</note></topic><topic id="23" parent="20" x="421.91" y="193.87" text="BCP"></topic><topic id="24" parent="23" x="274.72" y="115.10" text="Scope"><note>BCP could be enterprise-wide or it can cover only portions of the organization.
Another question is if the BCP supposed cover just large potential threats (huricanes, floods,..) or deal with smaller issues as well (connection failure, power loss)</note></topic><topic id="25" parent="23" x="340.54" y="113.37" text="Policy"><note>Supplies the framework, describes purpose of BCP.
Content of the policy include scope, mission statement, principles, guidelines, standards.
The BCP team produces and revise the policy, although top-tier management is responsible for it.</note></topic><topic id="26" parent="23" x="419.79" y="115.23" text="Project\Nmanagement"><note>A SWOT analysis can be carried out to ensure that the defined objectives within the scope can be accomplished.</note></topic><topic id="27" parent="26" x="383.90" y="58.41" text="SWOT"><note>Strengths Characteristics of the project team that give it an advantage over others
Weaknesses Characteristics that place the team at a disadvantage relative to others
Opportunities Elements that could contribute to the project’s success
Threats Elements that could contribute to the project’s failure</note></topic><topic id="28" parent="26" x="455.36" y="55.76" text="Project plan"><note>A project plan should be developed that has the following components:
- Objective-to-task mapping
- Resource-to-task mapping
- Workflows
- Milestones
- Deliverables
- Budget estimates
- Success factors
- Deadlines
Once the project plan is completed, it should be presented to management for written approval before any further steps are taken.</note></topic><topic id="29" parent="23" x="524.40" y="108.15" text="BIA"><note>A BIA (business impact analysis) is considered a functional analysis, in which a team collects data through interviews and documentary sources; documents business functions, activities, and transactions; develops a hierarchy of business functions; and finally applies a classification scheme to indicate each individual function’s criticality level.</note></topic><topic id="30" parent="29" x="605.02" y="-26.83" text=".data gathering\N.critical business functions identification\N.identify resources these functions depend upon\N.calculate how long these functions can survive without resources\N.identify vulnerabilities and threats\N.calculate the risk\N.document findings and report them to management"></topic><topic id="31" parent="30" x="821.71" y="-114.59" text="MTD"><note>Maximum tolerable downtime
After this time period company may not be able to recover - deadline</note></topic><topic id="32" parent="31" x="822.18" y="-174.08" text="RTO"><note>Recovery Time Objective (RTO) is the earliest time period and a service level within which a business process must be restored after a disaster to avoid unacceptable consequences associated with a break in business continuity. The RTO value is smaller than the MTD value, because the MTD value represents the time after which an inability to recover significant operations will mean severe and perhaps irreparable damage to the organization’s reputation or bottom line.
The RTO assumes that there is a period of acceptable downtime.
An RTO is the amount of time it takes to recover from a disaster</note></topic><topic id="33" parent="31" x="871.28" y="-173.65" text="WRT"><note>The Work Recovery Time (WRT) is the remainder of the overall MTD value.
RTO usually deals with getting the infrastructure and systems back up and running, and WRT deals with restoring data, testing processes, and then making everything “live” for production purposes.</note></topic><topic id="34" parent="30" x="768.63" y="-113.90" text="RPO"><note>The Recovery Point Objective (RPO) is the acceptable amount of data loss measured in time.
This value represents the earliest point in time at which data must be recovered.
The higher the value of data, the more funds or other resources that can be put into place to ensure a smaller amount of data is lost in the event of a disaster.
An RPO is the amount of acceptable data, measured in time, that can be lost from the same event.</note></topic><topic id="35" parent="23" x="929.24" y="226.90" text="Recovery"><note>Recovery procedures</note></topic><topic id="36" parent="35" x="774.61" y="150.02" text="Disruption"></topic><topic id="37" parent="36" x="712.29" y="61.24" text="Nondisaster"><note>Disruption of a service due to a device malfunction or failure</note></topic><topic id="38" parent="36" x="790.48" y="65.03" text="Disaster"><note>A disaster is an event that causes the entire facility to be unusable for a day or longer</note></topic><topic id="39" parent="36" x="836.56" y="107.74" text="Catastrophe"><note>Major disruption that destroys the facilities all together</note></topic><topic id="40" parent="35" x="593.42" y="125.48" text="MTBF"><note>Mean time between failures
- estimated lifetime of a piece of equipment, calculated by the vendor</note></topic><topic id="41" parent="35" x="646.65" y="128.62" text="MTTR"><note>Mean time to repair
- an estimate of how long it will take to fix a piece of equipment</note></topic><topic id="42" parent="35" x="786.19" y="256.59" text="Hot site"><note>- fully configured and ready to operate within few hours
Most expensive of the three types of offsite facilities.
This is a subscription service (not owned and maintained by the company)</note></topic><topic id="43" parent="42" x="798.59" y="299.50" text="Rolling"><note>Mobile version</note></topic><topic id="44" parent="35" x="864.81" y="275.49" text="Warm site"><note>- partially configured with some equipment, such as HVAC,and foundational infrastructure components, but not the actual computers.
Most of the companies use warm site, which have some devices such as disk drives, tape drives, and controllers, but very little else.
So the same as hot site - computers</note></topic><topic id="45" parent="35" x="715.37" y="241.04" text="Cold site"><note>Eg empty data center</note></topic><topic id="46" parent="35" x="971.48" y="270.49" text="Tertiary site"><note>Secondary backup site - backup to backup or plan B</note></topic><topic id="47" parent="46" x="1053.34" y="311.64" text="Reciprocal agreement"><note>Company A agrees to allow company B to use its facilities if company B is hit by a disaster,and vice versa.
Cheaper then offsite
A reciprocal agreement is not enforceable !!!</note></topic><topic id="48" parent="46" x="915.19" y="315.70" text="Mutual aid agreement"><note>More than two organizations agree to help one other in case of an emergency.</note></topic><topic id="49" parent="35" x="1069.21" y="272.57" text="Redundant site"><note>Or mirrored site, configured exactly as the primary site.
The business-processing capabilities between the two sites can be completely synchronized.
This is property of the company, not a subscription service</note></topic><topic id="50" parent="35" x="1171.99" y="258.68" text="Multiple\Nprocessing\Ncenters"><note>Organization may have more interconnected facilities and switch between them in order if seconds</note></topic><topic id="51" parent="35" x="1050.71" y="90.50" text="Backups"></topic><topic id="52" parent="51" x="1121.64" y="43.24" text="HW"></topic><topic id="53" parent="52" x="1130.58" y="1.05" text="Disk shadowing"><note>Two or more hdd are used to hold the exact same data.</note></topic><topic id="54" parent="51" x="1125.51" y="88.38" text="SW"></topic><topic id="55" parent="54" x="1238.95" y="139.41" text="Remote journaling"><note>Usually includes moving only the journal or transaction logs to the offsite facility.
These logs contains deltas - this can be used to rebuild the record</note></topic><topic id="56" parent="54" x="1116.60" y="139.40" text="Electronic vaulting "><note>Makes copies of files as they are modified and periodically transmit them to an offsite backup site.
This type of backup takes place in many financial institutions (change to the customer account is made locally and to a remote DB)</note></topic><topic id="57" parent="54" x="1288.61" y="100.49" text="Tape vaulting"><note>Tape vaulting
- automatic (electronic)
- manual
Electronic transmits data over a network to the offsite's facility tape device</note></topic><topic id="58" parent="54" x="1229.18" y="50.05" text="Replication"></topic><topic id="59" parent="58" x="1245.23" y="-15.60" text="Asynchronous "><note>Primary and secondary data volumes are out of sync (seconds, hours, dates)</note></topic><topic id="60" parent="58" x="1346.28" y="-14.79" text="Synchronous "><note>Primary and secondary repositories are always in sync</note></topic><topic id="61" parent="51" x="973.26" y="42.57" text="Personnel"><note>Executive succession plan
If someone in a senior executive retires, leaves, dies, the organization has predetermined steps to carry out to protect the company.</note></topic><topic id="62" parent="51" x="973.17" y="93.49" text="Offsite"></topic><topic id="63" parent="51" x="1054.41" y="-35.19" text="Types"></topic><topic id="64" parent="63" x="1051.90" y="-76.47" text="Incremental"><note>Backs up all files that have been changed since the last full backup or incremental backup</note></topic><topic id="65" parent="63" x="962.15" y="-75.76" text="Differential"><note>Saves files that have been modified since last full backup</note></topic><topic id="66" parent="63" x="1132.03" y="-74.77" text="Full backup "></topic><topic id="67" parent="0" x="223.06" y="370.23" text="Preventive Measures"><note>Fortification of the facility in its construction materials
Redundant servers and communications links
Redundant power lines coming in through
different transformers
Redundant vendor support
Purchasing of insurance
Purchasing of uninterruptible power supplies
(UPSs) and generators
Data backup technologies
Media protection safeguards
Increased inventory of critical equipment
Fire detection and suppression systems</note></topic><topic id="68" parent="0" x="144.06" y="506.23" text="Recovery Strategies"></topic><topic id="69" parent="68" x="20.23" y="508.40" text="HA"><note>High availability
Is a combination of technologies and processes that work together to ensure that something is always up and running</note></topic><topic id="70" parent="69" x="-74.23" y="510.05" text="Redundancy"><note>Redundancy is commonly built into the network at a routing protocol level. The routing protocols are configured so if one link goes down or gets congested, then traffic is routed over a different network link. Redundant hardware can also be available so if a primary device goes down, the backup component can be swapped out and activated.</note></topic><topic id="71" parent="70" x="-178.17" y="511.87" text="Failover"><note>If a technology has a failover capability, this means that if there is a failure that cannot be handled through normal means, then processing is “switched over” to a working system.</note></topic><topic id="72" parent="69" x="-47.08" y="443.41" text="Fault tolerance"><note>Fault tolerance is the capability of a technology to continue to operate as expected even if something unexpected takes place (a fault).</note></topic><topic id="73" parent="0" x="197.06" y="635.23" text="Insurance"><note>During the BIA, the team most likely uncovered several threats that the organization could not prevent. Taking on the full risk of these threats often is dangerous, which is why insurance exists.
The company’s insurance should be reviewed annually, because threat levels may change and the company may expand into new ventures that need to be properly covered.</note></topic><topic id="74" parent="73" x="89.51" y="657.99" text="business\Ninterruption\Ninsurance"><note>A company could choose to purchase a business interruption insurance policy. With this type of policy, if the company is out of business for a certain length of time, the insurance company will pay for specified expenses and lost earnings.</note></topic><topic id="75" parent="73" x="167.00" y="709.24" text="Accounts receivable"><note>Another policy that can be bought insures accounts receivable. If a company cannot collect on its accounts receivable for one reason or another, this type of coverage covers part or all of the losses and costs.</note></topic><topic id="76" parent="0" x="440.06" y="653.23" text="Recovery and\NRestoration"><note>The BCP must outline the specific teams, their responsibilities, and notification procedures</note></topic><topic id="77" parent="76" x="296.28" y="687.84" text="Restoration team"><note>The restoration team should be responsible for getting the alternate site into a working and functioning environment</note></topic><topic id="78" parent="76" x="326.79" y="737.07" text="Salvage team"><note>The salvage team should be responsible for starting the recovery of the original site.</note></topic><topic id="79" parent="76" x="366.97" y="798.51" text="Damage assessment"><note>- Determine the cause of the disaster.
- Determine the potential for further damage.
- Identify the affected business functions and areas.
- Identify the level of functionality for the critical resources.
- Identify the resources that must be replaced immediately.
- Estimate how long it will take to bring critical functions back online.
- If it will take longer than the previously estimated MTD values to restore operations, then a disaster should be declared and the BCP should be put into action.</note></topic><topic id="80" parent="76" x="630.18" y="791.50" text="Reconstitution phase"><note>When it is time for the company to move back into its original site or a new site, the company enters the reconstitution phase.</note></topic><topic id="81" parent="76" x="497.70" y="800.68" text="Recovery phase"><note>Once the damage assessment is completed and the plan is activated, various teams must be deployed, which signals the company’s entry into the recovery phase.</note></topic><topic id="82" parent="0" x="786.84" y="728.23" text="Testing and\NRevising the Plan"></topic><topic id="83" parent="82" x="673.98" y="727.66" text="COOP"><note>Continuity of operations is U.S. Government initiative. BCP and COOP have the same basic goals, but BCP is commonly private-sector oriented and COOP is commonly public-sector oriented.</note></topic><topic id="84" parent="82" x="683.74" y="615.48" text="Checklist"><note>Aka desk check test, in this type if test copies of The BCP are distributed to the different departments for review.
The goal is to check if some things have not been omitted</note></topic><topic id="85" parent="82" x="733.42" y="573.78" text="Structured\Nwalk-through"><note>Representatives from each department or functional area come together and go over the plan to ensure its accuracy.
The group walks through different scenarios of the plan from beginning to end to make sure nothing was left out. This also raises the awareness of team members about the recovery procedures.</note></topic><topic id="86" parent="82" x="812.89" y="554.79" text="Simulation"><note>All employees who participate in operational and support functions, or their representatives, come together to practice executing the disaster recovery plan based on a specific scenario.</note></topic><topic id="87" parent="82" x="852.84" y="594.00" text="Parallel test"><note>A parallel test is done to ensure that the specific systems can actually perform adequately at the alternate offsite facility.
Some systems are moved to the alternate site and processing takes place. The results are compared with the regular processing that is done at the original site. This points out any necessary tweaking or reconfiguring.</note></topic><topic id="88" parent="82" x="888.35" y="632.10" text="Full interruption"><note>This type of test is the most intrusive to regular operations and business productivity. The original site is actually shut down, and processing takes place at the alternate site.</note></topic><topic id="89" parent="82" x="855.19" y="782.62" text="Maintaining"><note>- integrate into change control process
- assign responsibilities
- update plan
- distribute after update</note></topic></topics><relations><relation source="8" target="9"></relation><relation source="9" target="10"></relation><relation source="10" target="11"></relation><relation source="11" target="12"></relation><relation source="12" target="13"></relation><relation source="13" target="14"></relation><relation source="24" target="25"></relation><relation source="79" target="81"></relation><relation source="81" target="80"></relation></relations></mindmap></simplemind-mindmaps> | {
"repo_name": "ft44k/CISSP",
"stars": "30",
"repo_language": "None",
"file_name": "Domain 2 Access Control.smmx",
"mime_type": "text/xml"
} |
<?xml version="1.0" encoding="UTF-8"?>
<simplemind-mindmaps doc-version="3" generator="SimpleMindTouch" gen-version="1.7.5" device-type="ipad"><mindmap><meta><guid guid="449CFA1D1BC1842E1B161998"></guid><title text="Domain 9\NSW Development Security"></title><page><visual-area x="-429.61" y="-234.73" width="1845.48" height="1581.43"></visual-area></page><style key="system.spring-levels"></style><auto-numbering style="disabled"></auto-numbering><scrollstate zoom="96" x="106.11" y="83.96"></scrollstate><selection type="node" id="0"></selection><main-centraltheme id="0"></main-centraltheme></meta><topics><topic id="0" parent="-1" x="510.53" y="495.79" palette="1" colorinfo="1" text="Domain 9\NSW Development Security"></topic><topic id="1" parent="0" x="801.81" y="960.17" palette="2" colorinfo="2" text="System Development life cycle\N(SDLC)"><note>Key terms:
SDLC - a methodical approach to standardize requirements discovery, design, development, testing, and implementation in every phase of a system.
Certification - the technical testing of a system
Accreditation - the formal authorization given by management to allow a system to operate in a specific environment</note></topic><topic id="2" parent="1" x="594.40" y="950.15" text="Initiation "></topic><topic id="3" parent="1" x="615.26" y="996.51" text="Acquisition/Development "></topic><topic id="4" parent="1" x="714.61" y="1030.85" text="Implementation"></topic><topic id="5" parent="1" x="851.23" y="1044.25" text="Operations/Maintenance"></topic><topic id="6" parent="1" x="965.51" y="1058.60" text="Disposal"></topic><topic id="7" parent="0" x="789.50" y="687.59" palette="3" colorinfo="3" text="Software development life\Ncycle (SDLC)"></topic><topic id="8" parent="7" x="975.26" y="736.65" text="Requirements gathering"></topic><topic id="9" parent="8" x="1163.66" y="768.38" text=".security requirements\N.security risk assessment \N.privacy risk assessment \N.risk-level acceptance"></topic><topic id="10" parent="7" x="970.18" y="701.99" text="Design"><note>The decisions made during the design phase are pivot steps to the development phase.</note></topic><topic id="11" parent="10" x="1162.53" y="706.12" text=".attack surface analysis\N.threat modeling"></topic><topic id="12" parent="7" x="993.34" y="664.09" text="Development"></topic><topic id="13" parent="12" x="1159.61" y="656.40" text=".automated CASE tools\N.static analysis"></topic><topic id="14" parent="7" x="1025.79" y="629.28" text="Testing/Validation"></topic><topic id="15" parent="14" x="1279.37" y="594.25" text=".dynamic analysis\N.fuzzing\N.manual testing\N.unit, integration, acceptance, regression testing"><note>Testing:
Unit - individual component is in a controlled environment where programmers validate data structures,logic,and boundary conditions
Integration - verifying that components work together
Acceptance - ensuring that code meets customers requirements
Regression - after a change to a system takes place, retesting to ensure functionality, performance, and protection</note></topic><topic id="16" parent="7" x="1050.00" y="593.49" text="Release/Maintenance"></topic><topic id="17" parent="16" x="1181.63" y="527.98" text=".verification\N.validation"><note>Verification determines if the product meets the specification.
Validation determines if the product provides the necessary solution for the problem</note></topic><topic id="18" parent="7" x="826.11" y="774.03" text="Project management"></topic><topic id="19" parent="18" x="964.47" y="790.86" text="Statement of Work\N(SOW)"><note>Document which describes the product and customer requirements</note></topic><topic id="20" parent="18" x="984.47" y="844.54" text="Work Breakdown structure\N(WBS)"><note>Tool used to define and group project's individual work elements in an organized manner. The SDLC should be illustrated in a WBS format.</note></topic><topic id="21" parent="0" x="868.46" y="57.06" palette="4" colorinfo="4" text="Software\NDevelopment\NModels"></topic><topic id="22" parent="21" x="974.81" y="116.79" text="Build and Fix"><note>Little or no planning involved. Problems are dealt with as they occur (after release)</note></topic><topic id="23" parent="21" x="995.60" y="71.70" text="Waterfall "><note>Linear-sequential life-cycle approach. Each phase must be completed in its entirety before the next phase can begin.
At the end of each phase, a review takes place to make sure the project is on the correct path.</note></topic><topic id="24" parent="21" x="996.24" y="22.86" text="V-shape"><note>This model emphasizes the verification and validation of the product at each phase.
Each phase must be completed before the next phase begins. But because the V-shaped model requires testing throughout the development phase and not just waiting until the end of the project, it has higher chance of success compared to the waterfall model.</note></topic><topic id="25" parent="21" x="976.32" y="-30.54" text="Prototyping"></topic><topic id="26" parent="25" x="1110.04" y="-41.18" text=".rapid prototyping\N.evolutionary prototypes\N.operational prototypes"></topic><topic id="27" parent="21" x="930.01" y="-86.33" text="Incremental"><note>In each increment
Analysis - design - code - test -> delivery
This would be similar to multi- waterfall cycles taking place one one piece of software as it matures through the DEV cycle.
Each incremental phase results in a deliverable that is an operational product. Working peace of sw is available in early stage of development.
This model is best to used when issues pertaining to risk, program complexity, funding, and functionality requirements need to be understood early in the product development cycle. If the customer needs to get some basic functionality quickly as it works on the development of the product, this can be a good model.</note></topic><topic id="28" parent="21" x="881.59" y="-127.38" text="Spiral"><note>Uses an iterative approach and places emphasis on risk analysis.
4 Phases:
- Planing
- Risk analysis
- Development
- Test and evaluation
This model allows new requirements to be addressed as they are uncovered.
The evaluation phase allows the customer to evaluate the product in its current state and provide feedback.
It is good for complex projects that have fluid requirements.
The angular aspect represents progress, radius represents cost.</note></topic><topic id="29" parent="21" x="799.48" y="-170.54" text="Rapid Application Development\NRAD"><note>Combines the use of prototyping and iterative approach.
Steps:
- analysis and quick design
<in loop>
- demonstrate
- refine
- build
</in loop>
- testing
- implementing
This model allows the customer to be involved during the development phase so that the end result maps to their needs in a more realistic manner.</note></topic><topic id="30" parent="21" x="687.90" y="-216.86" text="Agile"><note>An umbrella term for several development methodologies.
Promotes cross-functional teamwork and continuous feedback mechanism.
This model focuses on individual interaction instead of processes and tools. It emphasizes developing the right software product over comprehensive and laborious documentation.
The Agile model does not use prototypes to represent the full product, but breaks the product down into individual features.</note></topic><topic id="31" parent="21" x="672.88" y="28.87" text="Exploratory"><note>Used when a clearly defined project objectives have not been presented.
Relies on covering a set of specifications that are likely to affect the final product's functionality.
Testing is an important part of exploratory development, as it ascertains that the current phase of the project is compliant with likely implementation scenarios.</note></topic><topic id="32" parent="21" x="643.40" y="70.98" text="Joint Analysis Development\N(JAD)"><note>Uses a team approach in application development in a workshop-oriented environment</note></topic><topic id="33" parent="21" x="668.67" y="118.35" text="Reuse"><note>Reduces the time needed for development using pre- existing prototypes</note></topic><topic id="34" parent="21" x="687.61" y="155.19" text="Cleanroom"><note>Attempts to prevent errors or mistakes by following structured and formal methods of developing and testing.
This approach is used for high-quality and critical applications that will be put through a strict certification process</note></topic><topic id="35" parent="0" x="367.87" y="-33.32" text="Capability Maturity Model Integration\N(CMMI)"><note>A process improvement approach that provides organizations with essential elements of effective processes, which will improve their performance.
5 Maturity levels of the CMMI:
- initial : dev process is ad hoc
- repeatable : change control, QA are in place
- Defined : formal procedures are in place
- Managed : processes for metrics
- Optimizing : integrated plans for continuous process improvement</note></topic><topic id="36" parent="0" x="272.08" y="33.00" text="Change Control"><note>The process of controlling the change that take place during the life cycle of a system and documenting the necessary change control activities</note></topic><topic id="37" parent="0" x="161.56" y="81.42" text="Software Configuration Management\N(SCM)"><note>Identifies the attributes of software at various points in time, and performs a methodical control of changes for the purpose of maintaining software integrity and traceability throughout the software development life cycle.</note></topic><topic id="38" parent="0" x="440.51" y="19.32" text="Software Escrow"><note>Storing of the source code of software with a third-party escrow agent.
The sw source code is released to the licensee if the licensor files for bankruptcy or fails to maintain and update the product as promised in the software license agreement.</note></topic><topic id="39" parent="0" x="214.19" y="516.16" text="Programming Languages\Nand Concepts"></topic><topic id="40" parent="39" x="16.02" y="525.58" text="Generations of\Nprogramming\Nlanguages"></topic><topic id="41" parent="40" x="-127.98" y="528.22" text="1. Machine language\N2. Assembly language\N3. High-level language\N4. Very high level\N5. Natural language"></topic><topic id="42" parent="39" x="83.91" y="445.16" text="Cohesion"><note>A measurement that indicates how many different types of tasks a module needs to carry out.
High cohesion means that a module can carry out only one task ( or several very similar tasks)</note></topic><topic id="43" parent="39" x="107.79" y="390.68" text="Coupling"><note>A measurement that indicates how much interaction one module requires for carrying out its tasks.
Low (loose) coupling means that module does not need to communicate with many other modules to carry out its job.</note></topic><topic id="44" parent="0" x="-0.35" y="711.26" text="Distributed computing"></topic><topic id="45" parent="44" x="-292.26" y="654.32" text="Distributed Computing Environment\N(DCE)"><note>The first framework and development toolkit for developing client/server applications to allow for distributed computing</note></topic><topic id="46" parent="44" x="-301.11" y="717.76" text="Common Object Request Broker Architecture\N(CORBA)"><note>Open object-oriented standard architecture developed by the Object Management Group (OMG). The standards enable software components written in different computer languages and running on different systems to communicate.
IT contains two main parts:
- system-oriented components (ORB and object services)
- application-oriented components (application objects and common facilities)</note></topic><topic id="47" parent="44" x="-257.80" y="774.55" text="Object Request Broker\N(ORB)"><note>Manages all communications between components and enables them to interact in heterogeneous and distributed environment. The ORB act as a broker between a client request for a service from distributed object and the completion of that request.
ORB is the middleware that allows the client/server communication to take place between objects residing on different systems.</note></topic><topic id="48" parent="44" x="-248.29" y="827.99" text="Component Object Model\N(COM)"><note>A model developed by Microsoft that allows for interprocess communication between applications potentially written in different programming languages on the same computer system.</note></topic><topic id="49" parent="44" x="-221.57" y="880.46" text="Distributed Component Object Model\N(DCOM)"><note>Supports distributed interprocess communication (IPC). It allows to access objects that reside in different parts of the network</note></topic><topic id="50" parent="44" x="-182.74" y="934.21" text="Object linking and embedding\N(OLE)"><note>Provides a way for objects to be shared on a local computer and to use COM as their foundation. It is technology developed by Microsoft that allows embedding and linking to documents and other objects.</note></topic><topic id="51" parent="44" x="-112.19" y="993.31" text="Java Platform\NEnterprise Edition\N(J2EE)"></topic><topic id="52" parent="44" x="-37.56" y="1053.24" text="Service-oriented architecture\N(SOA)"></topic><topic id="53" parent="44" x="85.14" y="1102.75" text="Simple Object Access Protocol\N(SOAP)"><note>An XML based protocol that encodes messages in a web service environment</note></topic><topic id="54" parent="44" x="95.32" y="1003.24" text="WSDL"><note>Web Service Description Language
Provides a machine readable description of the specific operations provided by the service.
WSDL document describes the requirements for interacting with requested service.</note></topic><topic id="55" parent="44" x="95.32" y="954.62" text="UDDI"><note>Universal Description, Discovery and Integration
Is an XML-based registry that list available services. It provides a method for services to be registered by service providers and located by service consumers.
UDDI provides mechanism to allow businesses around the world to publish their services and others to discover and use these services.</note></topic><topic id="56" parent="44" x="108.89" y="901.47" text="Mashup"><note>The combination of functionality, data, and presentation capabilities of two or more sources to provide some type of new service or functionality</note></topic><topic id="57" parent="44" x="146.21" y="852.85" text="Software as a Service\N(SAAS)"><note>A software delivery model that allows applications and data to be centrally hosted and accessed by thin clients, commonly web browsers. A common delivery method of cloud computing.</note></topic><topic id="58" parent="44" x="152.99" y="799.70" text="Cloud computing"><note>A method of providing computing as a service rather than as a physical product. It is Internet-based computing, whereby shared resources and software are provided to computers and other devices on demand.</note></topic><topic id="59" parent="0" x="187.78" y="1180.96" text="Mobile Code"><note>Code that can be transmitted across a network, to be executed by a system or device on the other end.</note></topic><topic id="60" parent="59" x="127.68" y="1233.05" text="Java applets"><note>When applet is executed , the JVM will create a virtual machine, which provides an environment called a sandbox</note></topic><topic id="61" parent="59" x="208.87" y="1236.22" text="ActiveX"><note>Set of OOP technologies and tools based on COM and DCOM. It is a framework for defining reusable software components.</note></topic><topic id="62" parent="61" x="228.15" y="1298.05" text="Authenticode"><note>Microsoft implementation of code signing used by ActiveX ( instead of sandboxing)</note></topic><topic id="63" parent="0" x="426.37" y="1216.02" text="Web Security"></topic><topic id="64" parent="63" x="441.19" y="1328.83" text="Information gathering"></topic><topic id="65" parent="63" x="564.57" y="1300.48" text="Server side includes"></topic><topic id="66" parent="63" x="669.73" y="1243.94" text="Client-side validation"></topic><topic id="67" parent="63" x="595.10" y="1203.24" text="Cross-site scripting\N(XSS)"><note>- nonpersistent XSS, or reflected, occur when an attacker tricks user into processing a URL, programmed with a rogue script to steal the victim's sensitive information.(cookie,session ID,...)
The principle lies in exploiting the lack of proper input or output validation on dynamic web sites.
- persistent XSS, or stored or second order vulnerabilities, are generally targeted at web sites that allow users to input data which are stored in a DB ( eg malicious JavaScript entered on a forum page)
- DOM based XSS, or local cross-site scripting.attacker uses DOM to modify the original JS</note></topic><topic id="68" parent="63" x="530.64" y="1137.65" text="Parameter validation"></topic><topic id="69" parent="63" x="366.36" y="1142.67" text="Web proxy"><note>Achilles
Burp
Fiddler</note></topic><topic id="70" parent="63" x="297.39" y="1220.69" text="Replay attack"></topic><topic id="71" parent="0" x="884.04" y="405.97" text="Database management"></topic><topic id="72" parent="71" x="1039.31" y="360.87" text="Models"><note>Relational
Hierarchical
Network - built upon the hierarchical
Object-oriented - more dynamic than relational
Object-relational - front end provides the procedures</note></topic><topic id="73" parent="71" x="1043.48" y="418.78" text="Interfaces"><note>ODBC - API allows communication with DB
OLE DB - replacement of ODBC, COM based, accessed via ADO
ADO - high level, set of COM objects, SQL not required
JDBC - Java API , can bridge through ODBC or connect directly</note></topic><topic id="74" parent="71" x="1041.10" y="305.91" text="Languages"><note>DDL - data definition language
Defines the structure and schema of the DB
DML - data manulation language
Commands that allow user to view,and use the DB ( view,add, sort,delete)
QL- query language
Enables users to make request to the DB</note></topic><topic id="75" parent="71" x="1014.69" y="233.64" text="Security issues"></topic><topic id="76" parent="75" x="1123.75" y="226.26" text="Aggregation &\NInference"><note>The act of combining information from separate sources. The combined information has a sensitivity that is greater that the individual parts
Inference is the ability to derive information not explicitly available</note></topic><topic id="77" parent="76" x="1301.10" y="214.55" text="Content-depended\Naccess control"><note>The more sensitive the data, the smaller the subset of individuals who can gain access.</note></topic><topic id="78" parent="76" x="1304.50" y="260.85" text="Context-dependend\Naccess control"><note>Application keeps track of user requests.
The software must be preprogrammed as to what sequence and how much data user is allowed to view.</note></topic><topic id="79" parent="76" x="1201.51" y="137.21" text="Views"><note>Database can employ discretionary access control (DAC) and mandatory access control (MAC)</note></topic><topic id="80" parent="76" x="1298.27" y="301.59" text="Polyinstantiation"><note>Multiple tuples with the same primary key- used based on a security level of the requesting object</note></topic><topic id="81" parent="76" x="1308.30" y="173.38" text="Noise and perturbation"><note>Inserting bogus information</note></topic><topic id="82" parent="76" x="1289.46" y="138.38" text="Cell suppression"><note>Technique used to hide specific cells</note></topic><topic id="83" parent="75" x="1081.17" y="167.73" text="Load balancing &\NFault tolerance"></topic><topic id="84" parent="83" x="1181.75" y="87.99" text="Online transaction processing\N(OLTP)"><note>Ensures that transactions happen properly or they don't happen at all.</note></topic><topic id="85" parent="71" x="1035.61" y="467.86" text="Expert\Nsystems/knowledge-based\Nsystems"><note>Rule based programing is a common way of developing expert system (if then rules)</note></topic><topic id="86" parent="85" x="1200.63" y="430.13" text="Inference engine"><note>The brain of the system</note></topic><topic id="87" parent="71" x="853.92" y="507.09" text="Artificial neural networks"></topic></topics><relations></relations></mindmap></simplemind-mindmaps> | {
"repo_name": "ft44k/CISSP",
"stars": "30",
"repo_language": "None",
"file_name": "Domain 2 Access Control.smmx",
"mime_type": "text/xml"
} |
<?xml version="1.0" encoding="UTF-8"?>
<simplemind-mindmaps doc-version="3" generator="SimpleMindTouch" gen-version="1.8.0" device-type="ipad"><mindmap><meta><guid guid="627F0BA4941362D2B4D62C64"></guid><title text="Domain 1\NInformation Security\NGovernance and Risk\NManagement"></title><page><visual-area x="-403.84" y="0.00" width="1488.18" height="709.06"></visual-area></page><style key="system.spring-levels"></style><auto-numbering style="disabled"></auto-numbering><scrollstate zoom="100" x="-464.84" y="-186.00"></scrollstate><selection type="node" id="28"></selection><main-centraltheme id="0"></main-centraltheme></meta><topics><topic id="0" parent="-1" x="500.00" y="500.00" palette="1" colorinfo="1" text="Domain 1\NInformation Security\NGovernance and Risk\NManagement"></topic><topic id="1" parent="0" x="701.07" y="574.90" palette="2" colorinfo="2" text="Fundamental\NPrinciples of\NSecurity"></topic><topic id="2" parent="1" x="825.52" y="646.88" text=".availability\N.integrity\N.confidentiality"></topic><topic id="3" parent="0" x="679.18" y="475.55" text="Security Definitions"></topic><topic id="4" parent="3" x="864.51" y="538.68" text=".vulnerability\N.threat agent\N.threat\N.risk\N.control\N.exposure"></topic><topic id="5" parent="0" x="660.18" y="402.55" text="Control types"></topic><topic id="6" parent="5" x="989.15" y="461.98" text="Control functionalities\N.deterrent\N.preventive\N.corrective\N.recovery\N.detective\N.compensating"><note>Deterrent - intended to discourage a potential attacker
Preventive - intended to avoid an incident from occurring
Corrective - fixes components or systems after an incident has occurred
Recovery - intended to bring the environment back to regular operations
Detective - helps identify an incident's activities and potential intruder
Compensating - controls that provide an alternative measure of control. Provides similar protection as the original control.</note></topic><topic id="7" parent="5" x="973.81" y="368.08" text="Control types\N.administrative\N.technical (logical)\N.physical"><note>.Logical or technical
Firewalls,encryption,sw permissions,authentication devices
.Administrative
Policies and procedures
Effective hiring practices
Data classification and labeling
Security awareness
.Physical
Badges, swipe cards
Guards, dogs
Fences, locks, mantraps</note></topic><topic id="8" parent="0" x="567.18" y="336.55" text="Security Frameworks"></topic><topic id="9" parent="8" x="676.42" y="245.72" text="Security Program\NDevelopment"></topic><topic id="10" parent="9" x="680.81" y="169.92" text="ISO/EIC 27000 series"><note>International standards on how to develop and maintain an ISMS.
PDCA cycle is used in this standard.
ISO/IEC 27000 overview and vocabulary
27001 ISMS requirements
27002 code of practice for information security management
27003 Guideline for ISMS implementation
27004 guideline for information security management measurement and metrics framework
27005 guideline for information security risk management
27006 guidelines for bodies providing audit and certification of information security management system
27011 information security management guidelines for telecommunications orbs
27031 guideline for information and communications technology readiness for business continuity
27033-1 guideline for network security
27799 guideline for information security management in health organizations</note></topic><topic id="11" parent="8" x="782.85" y="255.41" text="Enterprise\NArchitecture\NDevelopment"></topic><topic id="12" parent="11" x="830.75" y="177.97" text=".Zachman framework\N.TOGAF\N.DoDAF\N.MODAF"><note>All these were developed to provide holistic view of the organization, so the business people and technical people can communicate effectively.
Zachman Architecture Framework:
created by John Zachman.
Two-dimensional model that uses 6 basic communication interrogatives (what,how,where,who,when,why) interacting with different viewpoints ( planner,owner,designer,builder,implementer,worker). The goal of this model is to be able to look at the same organization from different views.
The Open Group Architecture Framework:
It has it's origin in the U.S. Dep. of Defense
It can be used to develop these arch types:
- Business Architecture
- Data Architecture
- Applications Architecture
- Technology Architecture
Through its Architecture Development Model ADM -> iterative and cyclic process.
These different architecture allow to understand the enterprise from 4 different views.
Military-Oriented Architecture Frameworks
- Department of Defense Arch Framework (DoDAF)
- British Ministry of Defence Arch Framework
(MODAF)
The crux of the frameworks is to get the right to the right people.
Both were developed to support military missions, they have been expanded for use in business enterprise environments</note></topic><topic id="13" parent="11" x="912.28" y="276.80" text="Enterprise Security \NArchitecture"><note>Is a subset of an enterprise architecture. Defines the information security strategy. It is a method for describing the structure of ISMS ( information security management system)
ISMS vs Security Enterprise Architecture
- ISMS outlines the controls that need to put into place and provides direction on how these should be managed
- SEA illustrates how these components are to be integrated into the different layers
Example: ISMS dictates that risk management needs to be put in place, and the enterprise architecture will chop up the risk management components and illustrates how risk management needs to take place at strategic, tactical, operational level.</note></topic><topic id="14" parent="13" x="1036.34" y="278.29" text=".SABSA model"><note>Sherwood Applied Business Security Architecture
Risk-driven architecture that maps to business initiatives ,similar to Zachman framework
Since it is a methodology also, it provides the process to follow to build and maintain.</note></topic><topic id="15" parent="8" x="558.55" y="242.50" text="Security Controls\NDevelopment"><note>ISO/EIC 27000 series outlines the necessary components of an org security program,
Enterprise security architecture helps us integrated the requirements outlined in the security program,
Security controls help to accomplish the goals outlined in the both above.</note></topic><topic id="16" parent="15" x="551.99" y="170.96" text=".CobiT\N.SP 800-53"><note>CobiT - Control Objectives for Information and related Technology, developed by the Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI).
Is a framework and set of control objectives.
4 main domains :
- plan and organize
- acquire and implement
- deliver and support
- monitor and evaluate
CobiT lays out executive summaries, management guidelines, frameworks, control objectives, an implementation toolset, performance indicators, success factors, maturity models, and audit guidelines. It lays out complete roadmap that can be followed to accomplish each of the 34 control objectives this model deals with.
NIST 800-53</note></topic><topic id="17" parent="8" x="427.88" y="241.68" text="Corporate Governance"></topic><topic id="18" parent="17" x="404.91" y="189.75" text=".COSO"><note>Governance model used to help prevent fraud within a corporate environment</note></topic><topic id="19" parent="8" x="274.88" y="239.68" text="Process Management"></topic><topic id="20" parent="19" x="188.55" y="184.74" text=".ITIL\N.Six Sigma\N.Capability Maturity Model Integration CMMI"><note>ITIL - is a set of best practices for IT service management
Six Sigma is used to identify defects in processes so that the process can be improved upon
CMMI is a maturity model that allows for processes to improve in an incremented and standard approach</note></topic><topic id="21" parent="0" x="264.18" y="505.55" text="Security Management"></topic><topic id="22" parent="21" x="-70.15" y="225.79" text="Risk Management"><note>Information Risk Management (IRM)
is the process of identifying and assessing risk, reducing it to an acceptable level, and implementing the right mechanism to maintain that level
Risk management team should include individuals from different departments within the org, not just technical personnel</note></topic><topic id="23" parent="21" x="-66.15" y="278.79" text="Information Risk\NManagement Policy"><note>The IRM policy provides the foundation and direction for the organization's security risk management process and procedures</note></topic><topic id="24" parent="21" x="-73.35" y="333.80" text="Risk Assessment\Nand Analysis"><note>Risk assessment is a method of identifying vulnerabilities and threats and assessing the possible impacts to determine where to implement security controls
Risk Analysis works with results of risk assessment. It helps to prioritize the risks and shows the amount of resources needed.
Risk analysis provides cost/benefit comparison that helps to choose the right safeguard</note></topic><topic id="25" parent="24" x="-214.94" y="341.30" text="Methodologies for\NRisk Assessment"></topic><topic id="26" parent="25" x="-352.84" y="348.60" text=".NIST SP 800-30\N.FRAP\N.OCTAVE\N.FMEA\N.CRAMM"><note>NIST 800-30 Risk Management Guide for Information Technology Systems
- a U.S. federal standard that is focused on IT risks
Facilitated Risk Analysis Process (FRAP)
- focus only on the systems that really need assessing (qualitative approach)
Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
- team oriented approach that assesses organizational and IT risks through facilitated workshops
Failure Modes and Effect Analysis (FMEA)
- approach that dissects a component into its basic functions to identify flaws and those flaws' effects
-> fault three analysis: used to detect failures within complex environments
CRAMM
- created by UK and it's automated tools are sold by Siemens</note></topic><topic id="27" parent="25" x="-266.93" y="245.44" text=".Quantitative risk analysis\N.Qualitative risk analysis"><note>Quantitative risk analysis
- assigning monetary and numerical values to all the data elements of a risk assessment.
A purely quantitative risk analysis is not possible because qualitative items cannot be quantified with precision. (tangible vs intangible assets)
-> single loss expectancy SLE
( asset value x exposure factor)
-> annualized loss expectancy ALE
(SLE x ARO = ALE)
Qualitative risk analysis
- opinion based method of analyzing risk with the use of scenarios and ratings
Total risk - amount of risk before a control is put in place
Residual risk - after implementing a control
Handling risk - accept, transfer, mitigate, avoid</note></topic><topic id="28" parent="27" x="-289.84" y="172.23" text="Delphi technique "><note>Group decision method where each group member can communicate anonymously</note></topic><topic id="29" parent="21" x="-67.84" y="392.94" text="Policies, Standards,\NBaselines, Guidelines"><note>.Policies
- a statement by management dictating the role security plays in the organization
.Procedures
- detailed step-by-step actions that should be followed to achieve a certain task
.Standards
- documents that outlines rules that are compulsory in nature and support the organization's security policies
.Baselines
- minimum level of security
.Guidelines
- recommendations and general approaches that provide advice and flexibility</note></topic><topic id="30" parent="21" x="-57.78" y="444.45" text="Information Classification"><note>Data owners specify the classification of data, and the data custodians implement and maintain controls to enforce the set classification levels</note></topic><topic id="31" parent="0" x="255.18" y="570.55" text="Layers of Responsibility"></topic><topic id="32" parent="0" x="367.18" y="633.55" text="Security Steering\NCommittee"></topic><topic id="33" parent="0" x="571.18" y="629.55" text="Security Governance"><note>Security governance is a framework that provides oversight, accountability, and compliance</note></topic><topic id="34" parent="33" x="605.05" y="691.19" text="Metrics"><note>NIST 800-55
- a standard for performance measurement for information security
ISO/IEC 27004:2009
- an international standard for information security measurement management</note></topic></topics><relations></relations></mindmap></simplemind-mindmaps> | {
"repo_name": "ft44k/CISSP",
"stars": "30",
"repo_language": "None",
"file_name": "Domain 2 Access Control.smmx",
"mime_type": "text/xml"
} |
<?xml version="1.0" encoding="UTF-8"?>
<simplemind-mindmaps doc-version="3" generator="SimpleMindTouch" gen-version="1.8.0" device-type="ipad"><mindmap><meta><guid guid="A8BD7F1BF14A7FAC189BB7A4"></guid><title text="Domain 5\NTelecommunications and Network Security"></title><page><visual-area x="-798.06" y="0.00" width="2952.30" height="1689.85"></visual-area></page><style key="system.spring-levels"></style><auto-numbering style="disabled"></auto-numbering><scrollstate zoom="69" x="618.11" y="275.64"></scrollstate><selection type="node" id="236"></selection><main-centraltheme id="0"></main-centraltheme></meta><topics><topic id="0" parent="-1" x="500.00" y="500.00" text="Domain 5\NTelecommunications and Network Security"></topic><topic id="1" parent="0" x="1510.52" y="609.00" text="Open Systems\NInterconnection Reference\NModel"></topic><topic id="2" parent="0" x="872.01" y="338.72" text="TCP/IP Model"></topic><topic id="3" parent="2" x="930.11" y="387.52" text="OSI model"><note>ISO 7498
Systems based on this model are called open systems
APSTNDP—To remember all the layers within the OSI model in the correct order, memorize “All People Seem To Need Data Processing.” Remember that you are starting at layer 7, the application layer, at the top.</note></topic><topic id="4" parent="3" x="1038.10" y="297.85" text="Application"><note>Provide file transmission, message exchange, terminal session,...
Examples: HTTP, SMTP, FTP, Telnet, LPD</note></topic><topic id="5" parent="3" x="1056.48" y="525.90" text="Physical"><note>converts bits into voltage for transmission.
This layer controls synchronization, data rates, line noise, and transmission techniques. Specifications for the physical layer include the timing of voltage changes, voltage levels, and the physical connectors for electrical, optical, and mechanical transmission.
Network interface cards and drivers convert bits into electrical signals and control the physical aspects of data transmission, including optical, electrical, and mechanical requirements. The following are some of the standard interfaces at this layer:
EIA-422, EIA-423, RS-449, RS-485
10BASE-T, 10BASE2, 10BASE5, 100BASE-TX, 100BASE-FX, 100BASE-T, 1000BASE-T, 1000BASE-SX
Integrated Services Digital Network (ISDN)
Digital subscriber line (DSL)
Synchronous Optical Networking (SONET)</note></topic><topic id="6" parent="3" x="1054.41" y="491.54" text="Data link"><note>The data link layer is where the network stack knows what format the data frame must be in to transmit properly over Token Ring, Ethernet, ATM, or Fiber Distributed Data Interface (FDDI) networks.
The data link layer is responsible for proper communication within the network components and for changing the data into the necessary format (electrical voltage) for the physical layer. It will also manage to reorder frames that are received out of sequence, and notify upper-layer protocols when there are transmission error conditions.
Some protocols that work at this layer include the following:
Address Resolution Protocol (ARP)
Reverse Address Resolution Protocol (RARP)
Point-to-Point Protocol (PPP)
Serial Line Internet Protocol (SLIP)
Ethernet
Token Ring
FDDI
ATM
When the data link layer applies the last header and trailer to the data message, this is referred to as framing. The unit of data is now called a frame.</note></topic><topic id="7" parent="6" x="1173.57" y="477.79" text="Logical link control LLC"><note>The LLC, defined in the IEEE 802.2 specification, communicates with the protocol immediately above it, the network layer.
The LLC layer takes care of flow control and error checking.</note></topic><topic id="8" parent="6" x="1186.05" y="511.66" text="Media Access Control MAC"><note>The technology at the MAC sublayer knows if the network is Ethernet, Token Ring, or ATM, so it knows how to put the last header and trailer on the packet before it “hits the wire” for transmission.
The IEEE MAC specification for Ethernet is 802.3, Token Ring is 802.5, wireless LAN is 802.11, and so on. So when you see a reference to an IEEE standard, such as 802.11, 802.16, or 802.3, it refers to the protocol working at the MAC sublayer of the data link layer of a protocol stack.</note></topic><topic id="9" parent="3" x="1036.53" y="374.12" text="Session"><note>The session layer protocols set up connections between applications; maintain dialog control; and negotiate, establish, maintain, and tear down the communication channel.
Some of the protocols that work at this layer include
Network File System (NFS)
NetBIOS
Structured Query Language (SQL)
Remote procedure call (RPC)
3 modes of operation:
Simplex: communication takes place one direction
Half-duplex: communication goes both directions, but only one application can send data at a time
Full-duplex: both directions, data can be send at the same time from both sides
Session layer protocols are the least used; thus many of them should be disabled on systems to decrease the chance of them getting exploited.</note></topic><topic id="10" parent="3" x="1042.80" y="334.26" text="Presentation"><note>Works as a translator. It adds information about the file type to tell the destination computer how to process and present it.
This layer also handles data compression and encryption ( tells how it was compresses and encrypted)</note></topic><topic id="11" parent="3" x="1044.29" y="410.21" text="Transport"><note>The protocols at the transport layer handle end-to-end transmission (connections between computer systems) and segmentation of a data stream. The following protocols work at this layer:
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
Sequenced Packet Exchange (SPX)</note></topic><topic id="12" parent="3" x="1044.64" y="452.14" text="Network"><note>The main responsibilities of the network layer, layer 3, are to insert information into the packet’s header so it can be properly addressed and routed, and then to actually route the packets to their proper destination.
The protocols that work at this layer do not ensure the delivery of the packets.
The responsibilities of the network layer protocols include internetworking service, addressing, and routing. The following lists some of the protocols that work at this layer:
Internet Protocol (IP)
Internet Control Message Protocol (ICMP)
Internet Group Management Protocol (IGMP)
Routing Information Protocol (RIP)
Open Shortest Path First (OSPF)
Internetwork Packet Exchange (IPX)
We are talking about packets/datagrams at this layer</note></topic><topic id="13" parent="2" x="837.45" y="284.52" text="TCP/IP"></topic><topic id="14" parent="13" x="879.81" y="249.47" text="IP "><note>IP is a connectionless network layer protocol and provides datagram routing services. IP’s main task is to support internetwork addressing and packet routing.</note></topic><topic id="15" parent="13" x="804.25" y="198.56" text="TCP\NUDP"><note>transport layer protocols
They both use ports to communicate with upper OSI layers and to keep track of various conversations that take place simultaneously.
TCP is a reliable and connection-oriented protocol.
It also supports packet sequencing (to ensure each and every packet was received), flow and congestion control, and error detection and correction.
UDP, on the other hand, is a best-effort and connectionless protocol. It has neither packet sequencing nor flow and congestion control, and the destination does not acknowledge every packet it receives.</note></topic><topic id="16" parent="15" x="731.67" y="129.05" text="Socket"><note>When a TCP or UDP message is formed, source and destination ports are contained within the header information along with the source and destination IP addresses. This makes up a socket, and is how packets know where to go (by the address) and how to communicate with the right service or protocol on the other computer (by the port number).</note></topic><topic id="17" parent="15" x="784.51" y="126.39" text="Ports"><note>1.well-known ports : 0-1023
2.Registered ports : 1024 - 49151
3.Dynamic ports : 49152 - 65535
1. almost every computer in the world has the exact same protocol mapped to the exact same port number.
2.can be registered with the Internet Corporation for Assigned Names and Numbers (ICANN) for a particular use. Vendors register specific ports to map to their proprietary software
3. These are available to be used by any application</note></topic><topic id="18" parent="15" x="703.04" y="169.91" text="TCP handshake"><note>TCP must set up a virtual connection between two hosts before any data are sent. This means the two hosts must agree on certain parameters, data flow, windowing, error detection, and options.
The TCP three-way handshake:
1. SYN
2. SYN/ACK
3. ACK
The connection that has been set up at this point is considered full duplex
Attacks:
SYN flood - attacker sends SYN packets with a spoofed address, then the victim system replies to the spoofed address with SYN/ACK packets. Each time the victim system receives one of these SYN packets it sets aside resources to manage the new connection. If the attacker floods the victim system with SYN packets, eventually the victim system allocates all of its available TCP connection resources and can no longer process new requests. This is a type of DoS.
To thwart this type of attack you can use SYN proxies, which limit the number of open and abandoned network connections.
TCP session hijacking
the attacker has to spoof the sender’s address and use the correct sequence number values. If an attacker can correctly predict the TCP sequence numbers that two systems will use, then he can create packets containing those numbers and fool the receiving system into thinking that the packets are coming from the authorized sending system.</note></topic><topic id="19" parent="13" x="735.43" y="231.02" text="IP Addressing"><note>Class A - 0.0.0.0 -> 127.255.255.255
Class B - 128.0.0.0 -> 191.255.255.255
Class C - 192.0.0.0 -> 223.255.255.255
Class D - 224.0.0.0 -> 239.255.255.255
Class E - 240.0.0.0 -> 255.255.255.255
A - first byte is the network address
B - first two bytes are the network address,rest two are the host portion
C - the first 3 bytes are the network portion, and the remaining one byte is the host portion
D - used for multicast addresses
E - reserved for research
classful or classical IP addresses - traditional subnet masks are used
classless IP addresses - subnets that do not follow these traditional sizes
classless interdomain routing (CIDR)
Note
IP provides addressing, packet fragmentation, and packet timeouts. To ensure that packets do not continually traverse a network forever, IP provides a Time to Live (TTL) value that is decremented every time the packet passes through a router. IP can also provide a Type of Service (ToS) capability, which means it can prioritize different packets for time-sensitive functions.</note></topic><topic id="20" parent="13" x="857.54" y="210.24" text="IPv6"><note>The IPv6 specification is outlined in RFC 2460
IPv6 address size is 128 bits
The scalability of multicast routing is improved by adding a “scope” field to multicast addresses. Also, a new type of address called an anycast address is defined, which is used to send a packet to any one of a group of nodes.</note></topic><topic id="21" parent="20" x="866.46" y="167.39" text="Tunneling"><note>Automatic tunneling is a technique where the routing infrastructure automatically determines the tunnel endpoints so that protocol tunneling can take place without preconfiguration.
The 6to4 and Teredo are intersite tunneling mechanisms, and ISATAP is an intrasite mechanism.
6to4
In the 6to4 tunneling method the tunnel endpoints are determined by using a well-known IPv4 anycast address on the remote side and embeds IPv4 address data within IPv6 addresses on the local side.
Teredo
is another automatic tunneling technique that uses UDP encapsulation so that NAT address translations are not affected.
Intra-Site Automatic Tunnel Addressing Protocol (ISA-TAP)
treats the IPv4 network as a virtual IPv6 local link, with mappings from each IPv4 address to a link-local IPv6 address.</note></topic><topic id="22" parent="2" x="964.32" y="245.28" text="Layer 2 Security\NStandards"></topic><topic id="23" parent="22" x="992.17" y="190.89" text="802.1X EAP-TLS\Nframework"><note>When a new device is installed on the network, it cannot just start communicating with other devices, receive an IP address from a Dynamic Host Configuration Protocol (DHCP) server, resolve names with the Domain Name Service (DNS) server, etc. The device cannot carry out any network activity until it is authorized to do so. So 802.1X port authentication kicks in, which means that only authentication data are allowed to travel from the new device to the authenticating server. The authentication data is the digital certificate and hardware identity associated with that device (802.1AR), which is processed by EAP-TLS. Once the device is authenticated, usually by a Remote Authentication Dial-In User Server (RADIUS) server, encryption keying material is negotiated and agreed upon between surrounding network devices. Once the keying material is installed, then data encryption and frame integrity checking can take place (802.1AE) as traffic goes from one network device to the next.</note></topic><topic id="24" parent="23" x="1017.89" y="122.58" text="802.1AR\NDevID"><note>The IEEE 802.1AR standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device (router, switch, access point) to its identifiers.</note></topic><topic id="25" parent="23" x="1080.94" y="149.39" text="802.1AE\NMACSec"><note>802.1AE is the IEEE MAC Security standard (MACSec)
Provides hop-to-hop protection, only authenticated and trusted devices on the network can communicate to each other.
When a frame arrives at a device that is configured with MACSec, the MACSec Security Entity (SecY) decrypts the frame if necessary and computes an integrity check value (ICV) on the frame and compares it with the ICV that was sent with the frame. If the ICVs match, the device processes the frame. If they do not match, the device handles the frame according to a preconfigured policy, such as discarding it.</note></topic><topic id="26" parent="23" x="952.98" y="114.20" text="802.1AF"><note>802.1AF carries out key agreement functions for the session keys used for data encryption.</note></topic><topic id="27" parent="0" x="562.92" y="172.95" text="Types of Transmission"></topic><topic id="28" parent="27" x="365.19" y="84.39" text="Signals"><note>Digital signals :
Binary digits are represented and transmitted as discrete electrical pulses. Signaling allows for higher data transfer rates and high data integrity compared to analog signaling.
Analog signals :
Continuously varying electromagnetic wave that represents and transmits data. Carrier signals vary by amplification and frequency.</note></topic><topic id="29" parent="27" x="459.18" y="84.59" text="Asynchronous and\NSynchronous"><note>Synchronous:
- Robust error checking, commonly through cyclic redundancy checking (CRC)
- Timing component for data transmission synchronization
- Used for high-speed, high-volume transmissions
- Minimal overhead compared to asynchronous communication
Asynchronous:
- No timing component
- Surrounds each byte with processing bits
- Parity bit used for error control
- Each byte requires three bits of instruction (start, stop, parity)</note></topic><topic id="30" parent="27" x="675.65" y="80.61" text="Broadband and Baseband"><note>Baseband transmission :
Uses the full bandwidth for only one communication channel and has a low data transfer rate compared to broadband.
Broadband transmission :
Divides the bandwidth of a communication channel into many channels, enabling different types of data to be transmitted at one time.</note></topic><topic id="31" parent="27" x="561.65" y="37.01" text="Bandwidth and\Nthroughput"><note>Bandwidth refers to the number of electrical pulses that can be transmitted over a link within a second, and these electrical pulses carry individual bits of information. Bandwidth is the data transfer capability of a connection and is commonly associated with the amount of available frequencies and speed of a link.
Data throughput is the actual amount of data that can be carried over this connection. Data throughput values can be higher than bandwidth values if compression mechanisms are implemented.</note></topic><topic id="32" parent="0" x="236.71" y="177.55" text="Cabling"></topic><topic id="33" parent="32" x="191.41" y="122.08" text="Coaxial"><note>Coaxial cable has a copper core that is surrounded by a shielding layer and grounding wire. This is all encased within a protective outer jacket.
Compared to twisted-pair cable, coaxial cable is more resistant to electromagnetic interference (EMI), provides a higher bandwidth, and supports the use of longer cable lengths, but Twisted-pair cable is cheaper and easier to work with.
Coaxial cabling is used as a transmission line for radio frequency signals. If you have cable TV, you have coaxial cabling entering your house and the back of your TV. The various TV channels are carried over different radio frequencies. This technology allows to use some of the “empty” TV frequencies for Internet connectivity.</note></topic><topic id="34" parent="32" x="132.62" y="167.04" text="Twisted pair"><note>Twisted-pair cabling has insulated copper wires surrounded by an outer protective jacket.
Shielded twisted pair (STP):
the cable has an outer foil shielding. This adds protection from radio frequency interference and electromagnetic interference.
Unshielded twisted pair (UTP):
Twisted-pair cabling, which does not have this extra outer shielding
Twisting of the wires protects the integrity and strength of the signals they carry. Each wire forms a balanced circuit, because the voltage in each pair uses the same amplitude, just with opposite phases. The tighter the twisting of the wires, the more resistant the cable is to interference and attenuation.</note></topic><topic id="35" parent="34" x="73.25" y="121.68" text="Cable ratings"><note>Category 1:
- Voice-grade telephone cable for up to 1 Mbps transmission rate
- Not recommended for network use, but modems can communicate over it.
Category 2:
- Data transmission up to 4 Mbps
- Used in mainframe and minicomputer terminal connections, but not recommended for high-speed networking.
Category 3:
- 10 Mbps for Ethernet and 4 Mbps for Token Ring
- Used in 10Base-T network installations.
Category 4:
- 16 Mbps
- Usually used in Token Ring networks.
Category 5:
- 100 Mbps; has high twisting and thus low crosstalk
- Used in 100Base-TX, CDDI, Ethernet, and ATM installations; most widely used in network installations.
Category 6:
- 10 Gbps
- Used in new network installations requiring high-speed transmission. Standard for Gigabit Ethernet.
Category 7:
- 10 Gbps
- Used in new network installations requiring higher-speed transmission.</note></topic><topic id="36" parent="32" x="247.49" y="70.85" text="Fiber optic"><note>Fiber-optic cabling has higher transmission speeds that allow signals to travel over longer distances. Fiber cabling is not as affected by attenuation and EMI when compared to cabling that uses copper. It does not radiate signals, as does UTP cabling, and is difficult to eavesdrop on; therefore, fiber-optic cabling is much more secure than UTP, STP, or coaxial.
Fiber-optic cable is expensive and difficult to work with. It is usually used in backbone networks and environments that require high data transfer rates.</note></topic><topic id="37" parent="36" x="265.21" y="23.68" text="Modes"><note>Single mode
Small glass core, and are used for high-speed data transmission over long distances. They are less susceptible to attenuation than multimode fibers.
Multimode
Large glass cores, and are able to carry more data than single-core fibers, though they are best for shorter distances because of their higher attenuation levels.</note></topic><topic id="38" parent="32" x="319.71" y="180.11" text="Problems"></topic><topic id="39" parent="38" x="406.11" y="182.78" text="Noise"><note>Noise can be caused by motors, computers, copy machines, fluorescent lighting, and microwave ovens, to name a few. This background noise can combine with the data being transmitted over the cable and distort the signal. The more noise there is interacting with the cable, the more likely the receiving end will not receive the data in the form originally transmitted.</note></topic><topic id="40" parent="38" x="404.56" y="223.95" text="Attenuation"><note>Attenuation is the loss of signal strength as it travels.
The longer a cable, the more attenuation occurs, which causes the signal carrying the data to deteriorate. This is why standards include suggested cable-run lengths.
The effects of attenuation increase with higher frequencies; thus, 100Base-TX at 80MHz has a higher attenuation rate than 10Base-T at 10MHz.
If a network administrator needs to run a cable longer than its recommended segment length, he needs to insert a repeater or some type of device that will amplify the signal and ensure it gets to its destination in the right encoding format.
Attenuation can also be caused by cable breaks and malfunctions. This is why cables should be tested. If a cable is suspected of attenuation problems, cable testers can inject signals into the cable and read the results at the end of the cable.</note></topic><topic id="41" parent="38" x="356.71" y="272.89" text="Crosstalk"><note>Crosstalk is a phenomenon that occurs when electrical signals of one wire spill over to the signals of another wire. When the different electrical signals mix, their integrity degrades and data corruption can occur. UTP is much more vulnerable to crosstalk than STP or coaxial because it does not have extra layers of shielding to help protect against it.
The two-wire pairs within twisted-pair cables form a balanced circuit because they both have the same amplitude, just with different phases. Crosstalk and background noise can throw off this balance, and the wire can actually start to act like an antenna, which means it will be more susceptible to picking up other noises in the environment.</note></topic><topic id="42" parent="32" x="196.93" y="239.00" text="Fire rating"><note>Some cables produce hazardous gases when on fire that would spread throughout the building quickly. Network cabling that is placed in these types of areas, called plenum space, must meet a specific fire rating to ensure it will not produce and release harmful chemicals in case of a fire. A ventilation system’s components are usually located in this plenum space, so if toxic chemicals were to get into that area, they could easily spread throughout the building in minutes.
Nonplenum cables usually have a polyvinyl chloride (PVC) jacket covering, whereas plenum-rated cables have jacket covers made of fluoropolymers.
Cables should be installed in unexposed areas so they are not easily tripped over, damaged, or eavesdropped upon. The cables should be strung behind walls and in the protected spaces as in dropped ceilings. In environments that require extensive security, wires are encapsulated within pressurized conduits so if someone attempts to access a wire, the pressure of the conduit will change, causing an alarm to sound and a message to be sent to the security staff.</note></topic><topic id="43" parent="32" x="297.32" y="133.11" text="Standards"><note>The standards are developed and maintained by the Telecommunications Industry Association (TIA) and the Electronic Industries Association (EIA).
The TIA/EIA-568-B standard enables the design and implementation of structured cabling systems for commercial buildings.
The majority of the standards define cabling types, distances, connectors, cable system architectures, cable termination standards and performance characteristics, cable installation requirements, and methods of testing installed cable.
The following are commonly used physical interface connection standards:
RJ-11 is often used for terminating telephone wires.
RJ-45 is often used to terminate twisted-pair cables in Ethernet environments.
BNC (British Naval Connector) is often used for terminating coaxial cables. It is used to connect various types of radio, television, and other radio-frequency electronic equipment. (Also referred to as Bayonet Neill–Concelman connector.)</note></topic><topic id="44" parent="0" x="-58.93" y="286.45" text="Network Foundations"></topic><topic id="45" parent="44" x="44.45" y="182.23" text="Topology"><note>Ring topology:
devices connected by unidirectional transmission links
Bus topology:
In a simple bus topology, a single cable runs the entire length of the network. Nodes are attached to the network through drop points on this cable.
2 types:
linear bus topology
has a single cable with nodes attached.
tree topology
has branches from the single cable, and each branch can contain many nodes.
Star topology:
all nodes connect to a central device such as a switch. It enables the network to be more resilient and not as affected if an individual node experiences a problem.
Mesh topology:
- full mesh topology
every node is directly connected to every other node, which provides a great degree of redundancy.
- partial mesh topology
every node is not directly connected. The Internet is an example of a partial mesh topology.</note></topic><topic id="46" parent="44" x="-42.42" y="173.12" text="Media Access\Ntechnology"><note>Media access technologies work at the data link layer of the OSI model.
The data link layer is actually made up of a MAC sublayer and an LLC sublayer. These media access technologies live at the MAC layer and have to interface with the LLC layer. These media access technologies carry out the framing functionality of a network stack, which prepares each packet for network transmission. These technologies differ in network capabilities, transmission speed, and the physical medium they interact with.</note></topic><topic id="47" parent="46" x="-145.68" y="128.78" text="LAN"><note>When two distinct LANs are connected by a router, the result is an internetwork, not a larger LAN. Each distinct LAN has its own addressing scheme, broadcast domain, and communication mechanisms. If two LANs are connected by a different data link layer technology, such as frame relay or ATM, they are considered a WAN.</note></topic><topic id="48" parent="47" x="-230.43" y="100.74" text="Ethernet\NIEEE 802.3"><note>Ethernet is a resource-sharing technology that enables several devices to communicate on the same network. Ethernet usually uses a bus or star topology.
- Defined by standard IEEE 802.3
- Uses the carrier sense multiple access with collision detection (CSMA/CD) access method
- Uses broadcast and collision domains
- Supports full duplex communication
- Can use coaxial, twisted-pair, or fiber-optic cabling types
10Base2, ThinNet, Coaxial,10 Mbps
10Base5, ThickNet,Coaxial,10 Mbps
10Base-T,UTP,10 Mbps
100Base-TX, Fast Ethernet,UTP,100 Mbps
1000Base-T, Gigabit Ethernet,UTP,1,000 Mbps
1000Base-X,Fiber, 1,000 Mbps</note></topic><topic id="49" parent="47" x="-227.14" y="153.24" text="Token Ring\NIEEE 802.5"><note>Originally developed by IBM and then defined by the IEEE 802.5 standard.
It uses a token-passing technology with a star-configured topology.
Signals travel in a logical ring. Each computer is connected to a central hub, called a Multistation Access Unit (MAU).
Physically, the topology can be a star, but the signals and transmissions are passed in a logical ring.</note></topic><topic id="50" parent="47" x="-142.06" y="72.49" text="FDDI\NIEEE 802.4"><note>Fiber Distributed Data Interface (FDDI) technology, developed by the American National Standards Institute (ANSI), is a high-speed, token-passing, media access technology.
FDDI can be employed for distances up to 100 kilometers.
It enables several tokens to be present on the ring at the same time, causing more communication to take place simultaneously.
Ring topologies are considered deterministic, meaning that the rate of the traffic flow can be predicted. This can be beneficial for time-sensitive applications.
FDDI has a data transmission speed of up to 100 Mbps and is usually used as a backbone network using fiber-optic cabling. FDDI also provides fault tolerance by offering a second counter-rotating fiber ring. The primary ring has data traveling clockwise and is used for regular data transmission. The second ring transmits data in a counterclockwise fashion and is invoked only if the primary ring goes down. Sensors watch the primary ring and, if it goes down, invoke a ring wrap so the data will be diverted to the second ring.
Each node on the FDDI network has relays that are connected to both rings, so if a break in the ring occurs, the two rings can be joined.</note></topic><topic id="51" parent="50" x="-50.38" y="41.31" text="Devices"><note>Single-attachment station (SAS)
Attaches to only one ring (the primary) through a concentrator
Dual-attachment station (DAS)
Has two ports and each port provides a connection for both the primary and the secondary rings
Single-attached concentrator (SAC) Concentrator that connects an SAS device to the primary ring
Dual-attached concentrator (DAC) Concentrator that connects DAS, SAS, and SAC devices to both rings</note></topic><topic id="52" parent="50" x="-55.89" y="84.18" text="CDDI"><note>Copper Distributed Data Interface (CDDI), can work over UTP cabling. (FDDI over copper)</note></topic><topic id="53" parent="46" x="-308.17" y="229.43" text="Media Sharing"><note>When there is just one transmission medium (i.e., UTP cable) that has to be shared by all nodes and devices in a network, this is referred to as a contention-based environment. Each system has to “compete” to use the transmission line, which can cause contention.</note></topic><topic id="54" parent="53" x="-404.06" y="263.47" text="Token Passing"><note>A token is a 24-bit control frame used to control which computers communicate at what intervals. The token is passed from computer to computer, and only the computer that has the token can actually put frames onto the wire.
The token contains the data to be transmitted and source and destination address information.
Each computer checks this message to determine whether it is addressed to it, which continues until the destination computer receives the message. The destination computer makes a copy of the message and flips a bit to tell the source computer it did indeed get its message. Once this gets back to the source computer, it removes the frames from the network. The destination computer makes a copy of the message, but only the originator of the message can remove the message from the token and the network.
If a computer that receives the token does not have a message to transmit, it sends the token to the next computer on the network. An empty token has a header, data field, and trailer, but a token that has an actual message has a new header, destination address, source address, and a new trailer.</note></topic><topic id="55" parent="53" x="-359.44" y="189.36" text="CSMA"><note>A transmission is called a carrier, so if a computer is transmitting frames, it is performing a carrier activity. When computers use the carrier sense multiple access with collision detection (CSMA/CD) protocol, they monitor the transmission activity, or carrier activity, on the wire so they can determine when would be the best time to transmit data.</note></topic><topic id="56" parent="55" x="-389.74" y="148.54" text="CD"><note>Ethernet uses CSMA\CD
When using the CSMA/CD access method, computers listen for the absence of a carrier tone on the cable, which indicates that no other system is transmitting data.
A collision happens when two or more frames collide, which most likely corrupts both frames. If a computer puts frames on the wire and its frames collide with another computer’s frames, it will abort its transmission and alert all other stations that a collision just took place. All stations will execute a random collision timer to force a delay before they attempt to transmit data. This random collision timer is called the back-off algorithm.
Collisions are usually reduced by dividing a network with routers or switches.</note></topic><topic id="57" parent="55" x="-417.83" y="209.76" text="CA"><note>Wi-Fi uses CSMA\CA
Carrier sense multiple access with collision avoidance (CSMA/CA)
each computer signals its intent to transmit data before it actually does so. This tells all other computers on the network not to transmit data right now because doing so could cause a collision.
Each system will wait a period of time before attempting to transmit data to ensure collisions do not take place. The wireless LAN technology 802.11 uses CSMA/CA for its media access functionality.</note></topic><topic id="58" parent="53" x="-259.03" y="274.30" text="Collision Domains"><note>A collision domain is a group of computers that are contending, or competing, for the same shared communication medium.
If the same subnet is divided by bridges, the bridges can enable the broadcast traffic to pass between the different parts of a subnet, but not the collisions. This is how collision domains are formed. Isolating collision domains reduces the amount of collisions that take place on a network and increases its overall performance.
Another benefit of restricting and controlling broadcast and collision domains is that it makes sniffing the network and obtaining useful information more difficult for an intruder as he traverses the network.</note></topic><topic id="59" parent="53" x="-235.64" y="200.90" text="Polling"><note>mainframe media access technology uses polling
Polling is media-sharing method where some systems are configured as primary stations and others are configured as secondary stations. At predefined intervals, the primary station asks the secondary station if it has anything to transmit. This is the only time a secondary station can communicate.</note></topic><topic id="60" parent="44" x="-314.18" y="319.81" text="Transmission Methods"></topic><topic id="61" parent="60" x="-425.97" y="323.42" text="Unicast\NBroadcast\NMulticast"><note>Unicast - from the source computer to one particular system
Multicast - the sending system uses this method, when needs to send to a specific group of systems.
IPv4 multicast protocols use a Class D address
Broadcast - If a system wants all computers on its subnet to receive a message, it will use this method.
How does a server multicast to one particular computer on a specific network and no other networks in between?
The user who elects to receive a multicast actually has to tell his local router he wants to get frames with this particular multicast address passed his way. The local router must tell the router upstream, and this process continues so each router between the source and destination knows where to pass this multicast data.</note></topic><topic id="62" parent="61" x="-498.94" y="307.79" text="IGMP"><note>Internet Group Management Protocol (IGMP)
is used to report multicast group memberships to routers.
Version 1:
multicast agents periodically send queries to systems on the network they are responsible for and update their databases, indicating which system belongs to which group membership.
Version 2 :
provides more granular query types and allows a system to signal to the agent when it wants to leave a group.
Version 3 :
allows the systems to specify the specific sources it wants to receive multicast traffic from.
The previous statements are true pertaining to IPv4. IPv6 handles multicasting differently compared to IPv4.</note></topic><topic id="63" parent="44" x="-538.28" y="416.66" text="Network Protocols\Nand Services"></topic><topic id="64" parent="63" x="-625.26" y="414.69" text="ARP"><note>MAC and IP addresses must be properly mapped so they can be correctly resolved. This happens through the Address Resolution Protocol (ARP). When the data link layer receives a frame, the network layer has already attached the destination IP address to it, but the data link layer cannot understand the IP address and thus invokes ARP for help. ARP broadcasts a frame requesting the MAC address that corresponds with the destination IP address. Each computer on the subnet receives this broadcast frame, and all but the computer that has the requested IP address ignore it. The computer that has the destination IP address responds with its MAC address. Now ARP knows what hardware address corresponds with that specific IP address. The data link layer takes the frame, adds the hardware address to it, and passes it on to the physical layer, which enables the frame to hit the wire and go to the destination computer. ARP maps the hardware address and associated IP address and stores this mapping in its table for a predefined amount of time. This caching is done so that when another frame destined for the same IP address needs to hit the wire, ARP does not need to broadcast its request again. It just looks in its table for this information.</note></topic><topic id="65" parent="64" x="-702.72" y="414.75" text="ARP table\Ncache\Npoisoning"><note>If the attacker modifies the MAC tables in Bob’s and Alice’s systems and maps his MAC address to their IP addresses, all traffic can be sent to his system without Bob and Alice being aware of it.
So ARP is critical for a system to communicate, but it can be manipulated to allow trafffic to be sent to unintended systems. ARP is a rudimentary protocol and does not have any security measures built in to protect itself from these types of attacks. Networks should have IDS sensors monitoring for this type of activity so that administrators can be alerted if this type of malicious activity is underway.</note></topic><topic id="66" parent="63" x="-705.20" y="485.10" text="DHCP"><note>Dynamic Host Configuration Protocol
UDP-based protocol that allows servers to assign IP addresses to network clients.
1. the client computer broadcasts a DHCPDISCOVER message on the network in search of the DHCP server.
2.Once the respective DHCP server receives the DHCPDISCOVER request, the server responds with a DHCPOFFER packet, offering the client an IP address.
3. Once the client receives the settings sent by the server through the DHCPOFFER, it responds to the server with a DHCPREQUEST packet confirming its acceptance of the allotted settings.
4.The server now acknowledges with a DHCPACK packet, which includes the validity period (lease) for the allocated parameters.</note></topic><topic id="67" parent="66" x="-746.06" y="532.30" text="DHCP Snooping"><note>DHCP snooping (on network switches) ensures that DHCP servers can assign IP addresses to only selected systems, identified by their MAC addresses. Also, advance network switches now have capability to direct clients toward legitimate DHCP servers to get IP addresses and restrict rogue systems from becoming DHCP servers on the network.</note></topic><topic id="68" parent="63" x="-564.26" y="527.52" text="RARP"><note>Reverse Address Resolution Protocol (RARP) frames go to all systems on the subnet, but only the RARP server responds. Once the RARP server receives this request, it looks in its table to see which IP address matches the broadcast hardware address. The server then sends a message that contains its IP address back to the requesting computer. The system now has an IP address and can function on the network.
Diskless workstations do not have a full operating system but have just enough code to know how to boot up and broadcast for an IP address, and they may have a pointer to the server that holds the operating system. The diskless workstation knows its hardware address, so it broadcasts this information so that a listening server can assign it the correct IP address.</note></topic><topic id="69" parent="63" x="-634.23" y="507.33" text="BOOTP"><note>The Bootstrap Protocol (BOOTP) was created after RARP to enhance the functionality that RARP provides for diskless workstations. The diskless workstation can receive its IP address, the name server address for future name resolutions, and the default gateway address from the BOOTP server. BOOTP usually provides more functionality to diskless workstations than does RARP.
The evolution of this protocol has unfolded as follows: RARP evolved into BOOTP, which evolved into DHCP.</note></topic><topic id="70" parent="63" x="-507.92" y="525.57" text="ICMP"><note>The Internet Control Message Protocol (ICMP) delivers status messages, reports errors, replies to certain requests, reports routing information, and is used to test connectivity and troubleshoot problems on IP networks.
The most commonly understood use of ICMP is through the use of the ping utility. When a person wants to test connectivity to another system, he may ping it, which sends out ICMP ECHO REQUEST frames. The replies on his screen that are returned to the ping utility are called ICMP ECHO REPLY frames and are responding to the ECHO REQUEST frames. If a reply is not returned within a predefined time period, the ping utility sends more ECHO REQUEST frames. If there is still no reply, ping indicates the host is unreachable.
ICMP also indicates when problems occur with a specific route on the network and tells surrounding routers about better routes to take based on the health and congestion of the various pathways. Routers use ICMP to send messages in response to packets that could not be delivered. The router selects the proper ICMP response and sends it back to the requesting host, indicating that problems were encountered with the transmission request.
ICMP is used by other connectionless protocols, not just IP, because connectionless protocols do not have any way of detecting and reacting to transmission errors, as do connection-oriented protocols. In these instances, the connectionless protocol may use ICMP to send error messages back to the sending system to indicate networking problems.</note></topic><topic id="71" parent="70" x="-386.66" y="558.61" text="Ping of Death"><note>The Ping of Death attack is based upon the use of oversized ICMP packets. If a system does not know how to handle ICMP packets over the common size of 65,536 bytes, then it can become unstable and freeze or crash.</note></topic><topic id="72" parent="70" x="-470.58" y="576.22" text="Smurf attack"><note>the attacker sends an ICMP ECHO REQUEST packet with a spoofed source address to a victim’s network broadcast address. This means that each system on the victim’s subnet receives an ICMP ECHO REQUEST packet. Each system then replies to that request with an ICMP ECHO REPLY packet to the spoof address provided in the packets—which is the victim’s address.</note></topic><topic id="73" parent="70" x="-558.11" y="575.43" text="Fraggle attack"><note>Fraggle uses the UDP protocol and Smurf uses the ICMP protocol.
They are both DDoS attacks that use spoofed source addresses and use unknowing systems to attack a victim computer.
The countermeasures to these types of attacks are to use firewall rules that only allow the necessary ICMP packets into the network and the use of IDS or IPS to watch for suspicious activities.</note></topic><topic id="74" parent="63" x="-442.35" y="508.80" text="SNMP"><note>Simple Network Management Protocol
- managing network IP devices
2 parts:
- Manager
is the server portion, which polls different devices to check status information. The server component also receives trap messages from agents and provides a centralized place to hold all network-wide information.
- Agent
is a piece of software that runs on a network device, which is commonly integrated into the operating system. The agent has a list of objects that it is to keep track of, which is held in a database-like structure called
the Management Information Base (MIB). An MIB is a logical grouping of managed objects that contain data used for specific management tasks and status checks.</note></topic><topic id="75" parent="74" x="-366.67" y="478.69" text="Trap"><note>The trap operation allows the agent to inform the manager of an event, instead of having to wait to be polled. For example, if an interface on a router goes down, an agent can send a trap message to the manager. This is the only way an agent can communicate with the manager without first being polled.</note></topic><topic id="76" parent="74" x="-356.48" y="511.87" text="Security issues"><note>SNMP is for good purposes (network management) and for bad purposes (target mapping, device reconfiguration)
community string is basically a password a manager uses to request data from the agent, and there are two main community strings with different levels of access: read-only and read-write.
the community strings are sent in cleartext in SNMP v1 and v2
The SNMP ports (161 and 162) should not be open to untrusted networks
version 3 has cryptographic functionality, which provides encryption, message integrity, and authentication security. So, SNMP v3 should be implemented</note></topic><topic id="77" parent="63" x="-415.72" y="444.08" text="DNS"><note>Domain Name System (DNS) A hierarchical distributed naming system for computers, services, or any resource connected to an IP-based network. It associates various pieces of information with domain names assigned to each of the participating entities.</note></topic><topic id="78" parent="77" x="-314.09" y="409.07" text="Zone transfer"><note>DNS zone transfer The process of replicating the databases containing the DNS data across a set of DNS servers.</note></topic><topic id="79" parent="77" x="-319.69" y="446.16" text="DNSSEC"><note>DNSSEC A set of extensions to DNS that provide to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attack types.</note></topic><topic id="80" parent="44" x="-432.27" y="633.70" text="E-mail services"></topic><topic id="81" parent="80" x="-526.35" y="641.95" text="SMTP"><note>Simple Mail Transfer Protocol (SMTP)
- message transfer agent, moves the message from the user’s computer to the mail server when the user clicks the Send button.
- Function also as a message transfer protocol between e-mail servers.
- SMTP is a message-exchange addressing standard, and most people are used to seeing its familiar addressing scheme: [email protected].
- works on top of the TCP</note></topic><topic id="82" parent="80" x="-510.69" y="681.55" text="POP"><note>Post Office Protocol
is an Internet mail server protocol that supports incoming and outgoing messages.
If a user is using POP, when he accesses his mail server to see if he has received any new messages, all messages are automatically downloaded to his computer.</note></topic><topic id="83" parent="80" x="-466.71" y="706.48" text="IMAP"><note>Internet Message Access Protocol
enables users to access mail on a mail server. IMAP provides all the functionalities of POP, but has more capabilities.
IMAP is a store-and-forward mail server protocol that is considered POP’s successor.</note></topic><topic id="84" parent="80" x="-416.84" y="705.25" text="SASL"><note>Simple Authentication and Security Layer
is a protocol-independent framework for performing authentication.
The use of SASL is not unique just to POP; other protocols, such as IMAP, Internet Relay Chat (IRC), Lightweight Directory Access Protocol (LDAP), and SMTP, can also use SASL and its functionality.</note></topic><topic id="85" parent="80" x="-364.14" y="679.15" text="Relaying"><note>Mail servers use a relay agent to send a message from one mail server to another.
Spammers will find mail servers on the Internet, or within company DMZs, that have loosely configured relaying mechanisms and use these servers to send their spam.</note></topic><topic id="86" parent="80" x="-316.45" y="632.92" text="Threats"></topic><topic id="87" parent="86" x="-225.81" y="601.82" text="E-mail spoofing"><note>is a technique used by malicious users to forge an e-mail to make it appear to be from a legitimate source.
E-mail spoofing is done by modifying the fields of e-mail headers, such as the From, Return-Path, and Reply-To fields, so the e-mail appears to be from a trusted source.
E-mail spoofing is caused by the lack of security features in SMTP.
E-mail spoofing can be mitigated in several ways.
- The SMTP server can be configured to prevent unauthenticated users from sending e-mails.
SMTP authentication (SMTP-AUTH) was developed to provide an access control mechanism.
- Sender Policy Framework (SPF), which is an e-mail validation system designed to prevent e-mail spam by detecting e-mail spoofing by verifying the sender’s IP address. SPF allows administrators to specify which hosts are allowed to send e-mail from a given domain by creating a specific SPF record in DNS. Mail exchanges use the DNS to check that mail from a given domain is being sent by a host sanctioned by that domain’s administrators.</note></topic><topic id="88" parent="86" x="-224.87" y="649.86" text="Spear phishing\NWhaling attack"><note>A spear phishing attack zeros in on specific people. So if an attacker wants your specific information because she wants to break into your bank account, she could gather information about you via Facebook, LinkedIn, or through other resources and create an e-mail from someone she thinks you will trust. A similar attack is called whaling. In a whaling attack an attacker usually identifies some “big fish” in an organization (CEO, CFO, COO, CSO) and targets them because they have access to some of the most sensitive data in the organization. The attack is finely tuned to achieve the highest likelihood of success.</note></topic><topic id="89" parent="44" x="-187.33" y="708.85" text="NAT"><note>Network address translation (NAT) The process of modifying IP address information in packet headers while in transit across a traffic routing device, with the goal of reducing the demand for public IP addresses.
The following lists current private IP address ranges:
10.0.0.0–10.255.255.255 Class A network
172.16.0.0–172.31.255.255 Class B networks
192.168.0.0–192.168.255.255 Class C networks</note></topic><topic id="90" parent="89" x="-263.41" y="710.12" text="Static mapping"><note>The NAT software has a pool of public IP addresses configured. Each private address is statically mapped to a specific public address. So computer A always receives the public address x, computer B always receives the public address y, and so on. This is generally used for servers that need to keep the same public address at all times.</note></topic><topic id="91" parent="89" x="-263.27" y="747.10" text="Dynamic mapping"><note>The NAT software has a pool of IP addresses, but instead of statically mapping a public address to a specific private address, it works on a first-come, first-served basis.
The balancing act is to estimate how many computers will most likely need to communicate outside the internal network at one time. This estimate is the number of public addresses the company purchases, instead of purchasing one public address for each computer.</note></topic><topic id="92" parent="89" x="-218.07" y="793.00" text="Port address\Ntranslation (PAT)"><note>The company owns and uses only one public IP address for all systems that need to communicate outside the internal network.
The NAT device has an IP address of 127.50.41.3. When computer A needs to communicate with a system on the Internet, the NAT device documents this computer’s private address and source port number (10.10.44.3; port 43,887). The NAT device changes the IP address in the computer’s packet header to 127.50.41.3, with the source port 40,000. When computer B also needs to communicate with a system on the Internet, the NAT device documents the private address and source port number (10.10.44.15; port 23,398) and changes the header information to 127.50.41.3 with source port 40,001. So when a system responds to computer A, the packet first goes to the NAT device, which looks up the port number 40,000 and sees that it maps to computer A’s real information. So the NAT device changes the header information to address 10.10.44.3 and port 43,887 and sends it to computer A for processing. A company can save a lot more money by using PAT, because the company needs to buy only a few public IP addresses, which are used by all systems in the network.</note></topic><topic id="93" parent="44" x="-83.05" y="778.06" text="Routing Protocols"></topic><topic id="94" parent="93" x="32.86" y="857.05" text="AS"><note>Individual networks on the Internet are referred to as autonomous systems (ASs). These ASs are independently controlled by different service providers and organizations. An AS is made up of routers, which are administered by a single entity and use a common Interior Gateway Protocol (IGP) within the boundaries of the AS. The boundaries of these ASs are delineated by border routers. These routers connect to the border routers of other ASs and run interior and exterior routing protocols. Internal routers connect to other routers within the same AS and run interior routing protocols. So, in reality, the Internet is just a network made up of ASs and routing protocols.</note></topic><topic id="95" parent="93" x="37.61" y="820.66" text="Dynamic"><note>dynamic routing protocol can discover routes and build a routing table. Routers use these tables to make decisions on the best route for the packets they receive. A dynamic routing protocol can change the entries in the routing table based on changes that take place to the different routes. When a router that is using a dynamic routing protocol finds out that a route has gone down or is congested, it sends an update message to the other routers around it. The other routers use this information to update their routing table, with the goal of providing efficient routing functionality.</note></topic><topic id="96" parent="93" x="26.67" y="785.80" text="Static"><note>A static routing protocol requires the administrator to manually configure the router’s routing table. If a link goes down or there is network congestion, the routers cannot tune themselves to use better routes.</note></topic><topic id="97" parent="93" x="33.92" y="748.91" text="Flapping"><note>Route flapping refers to the constant changes in the availability of routes.</note></topic><topic id="98" parent="93" x="39.72" y="710.91" text="Black hole"><note>If a router does not receive an update that a link has gone down, the router will continue to forward packets to that route, which is referred to as a black hole.</note></topic><topic id="99" parent="93" x="36.64" y="892.06" text="VRRP"><note>Virtual Router Redundancy Protocol VRRP is used in networks that require high availability where routers as points of failure cannot be tolerated. It is designed to increase the availability of the default gateway by advertising a “virtual router” as a default gateway. Two physical routers (primary and secondary) are mapped to one virtual router. If one of the physical routers fails, the other router takes over the workload.</note></topic><topic id="100" parent="93" x="-29.98" y="697.11" text="EGP"><note>The exterior routing protocols used by routers connecting different ASs are generically referred to as exterior gateway protocols</note></topic><topic id="101" parent="100" x="7.04" y="640.64" text="BGP"><note>The Border Gateway Protocol (BGP) enables routers on different ASs to share routing information to ensure effective and efficient routing between the different AS networks. BGP is commonly used by Internet service providers to route data from one location to the next on the Internet.
BGP uses a combination of link-state and distance-vector routing algorithms. It creates a network topology by using its link-state functionality and transmits updates on a periodic basis instead of continuously, which is how distance-vector protocols work. Network administrators can apply weights to the different variables used by link-state routing protocols when determining the best routes. These configurations are collectively called the routing policy.</note></topic><topic id="102" parent="93" x="-140.96" y="818.58" text="IGP"><note>Interior Gateway Protocol
Handles routing tasks within each AS</note></topic><topic id="103" parent="102" x="-198.75" y="867.03" text="Distance-vector"><note>Distance-vector routing protocols make their routing decisions based on the distance (or number of hops) and a vector (a direction). The protocol takes these variables and uses them with an algorithm to determine the best route for a packet.
Routers using these protocols do not possess information about the entire network topology</note></topic><topic id="104" parent="103" x="-201.99" y="918.90" text="RIP"><note>Routing Information Protocol RIP is a standard that outlines how routers exchange routing table data and is considered a distance-vector protocol, which means it calculates the shortest distance between the source and destination.
It is considered a legacy protocol because of its slow performance and lack of functionality. It should only be used in small networks.
RIP version 1 has no authentication, and RIP version 2 sends passwords in cleartext or hashed with MD5.</note></topic><topic id="105" parent="103" x="-300.96" y="858.05" text="IGRP"><note>Interior Gateway Routing Protocol IGRP is a distance-vector routing protocol that was developed by, and is proprietary to, Cisco Systems. Whereas RIP uses one criterion to find the best path between the source and destination, IGRP uses five criteria to make a “best route” decision. A network administrator can set weights on these different metrics so that the protocol works best in that specific environment.</note></topic><topic id="106" parent="103" x="-281.93" y="912.56" text="EIGRP"><note>Enhanced Interior Gateway Routing Protocol EIGRP is a Cisco proprietary and advanced distance-vector routing protocol. It allows for faster router table updates than its predecessor IGRP and minimizes routing instability, which can occur after topology changes. Routers exchange messages that contain information about bandwidth, delay, load, reliability, and maximum transmission unit (MTU) of the path to each destination as known by the advertising router.</note></topic><topic id="107" parent="102" x="-81.96" y="872.09" text="Link-state"><note>Link-state routing protocols build a more accurate routing table because they build a topology database of the network. These protocols look at more variables than just the number of hops between two destinations. They use packet size, link speed, delay, network load, and reliability as the variables in their algorithms to determine the best routes for packets to take.</note></topic><topic id="108" parent="107" x="-115.46" y="922.21" text="OSPF"><note>Open Shortest Path First OSPF
uses link-state algorithms to send out routing table information. The use of these algorithms allows for smaller, more frequent routing table updates to take place. This provides a more stable network than RIP, but requires more memory and CPU resources to support this extra processing.
OSPF allows for a hierarchical routing network that has a backbone link connecting all subnets together. OSPF has replaced RIP in many networks today. Authentication can take place with cleartext passwords or hashed passwords, or you can choose to configure no authentication on the routers using this protocol.</note></topic><topic id="109" parent="107" x="-51.59" y="916.46" text="IS-IS"><note>Intermediate System to Intermediate System (IS-IS) Link-state protocol that allows each router to independently build a database of a network’s topology. Similar to the OSPF protocol, it computes the best path for traffic to travel. It is a classless and hierarchical routing protocol that is vendor neutral.</note></topic><topic id="110" parent="0" x="-105.61" y="1067.37" text="Network Devices"></topic><topic id="111" parent="110" x="-187.81" y="1021.47" text="Repeater"><note>Repeaters work at the physical layer and are add-on devices for extending a network connection over a greater distance. The device amplifies signals because signals attenuate the farther they have to travel.
Repeaters can also work as line conditioners by actually cleaning up the signals. This works much better when amplifying digital signals than when amplifying analog signals, because digital signals are discrete units, which makes extraction of background noise from them much easier for the amplifier. If the device is amplifying analog signals, any accompanying noise often is amplified as well, which may further distort the signal.
A repeater does not work with addresses; it just forwards all signals it receives.</note></topic><topic id="112" parent="111" x="-252.09" y="986.85" text="Hub"><note>A hub is a multiport repeater. A hub is often referred to as a concentrator because it is the physical communication device that allows several computers and devices to communicate with each other. A hub does not understand or work with IP or MAC addresses. When one system sends a signal to go to another system connected to it, the signal is broadcast to all the ports, and thus to all the systems connected to the concentrator.</note></topic><topic id="113" parent="110" x="-217.50" y="1073.18" text="Bridge"><note>It works at the data link layer and therefore works with MAC addresses. When a frame arrives at a bridge, the bridge determines whether or not the MAC address is on the local network segment. If the MAC address is not on the local network segment, the bridge forwards the frame to the necessary network segment.
A bridge is used to divide overburdened networks into smaller segments to ensure better use of bandwidth and traffic control. A bridge amplifies the electrical signal, as does a repeater, but it has more intelligence than a repeater and is used to extend a LAN and enable the administrator to filter frames so he can control which frames go where.
- Reads header information, but does not alter it
- Builds forwarding tables based on MAC addresses
- Uses the same network address for all ports
- Filters traffic based on MAC addresses
- Forwards broadcast packets
- Forwards traffic if a destination address is unknown to the bridge</note></topic><topic id="114" parent="113" x="-296.83" y="1029.61" text="Broadcast storm"><note>Because bridges can forward all traffic, they forward all broadcast packets as well. This can overwhelm the network and result in a broadcast storm, which degrades the network bandwidth and performance.</note></topic><topic id="115" parent="113" x="-301.61" y="1070.80" text="Local"><note>A local bridge connects two or more LAN segments within a local area, which is usually a building.</note></topic><topic id="116" parent="113" x="-312.03" y="1109.67" text="Remote"><note>A remote bridge can connect two or more LAN segments over a MAN by using telecommunications links. A remote bridge is equipped with telecommunications ports, which enable it to connect two or more LANs separated by a long distance and can be brought together via telephone or other types of transmission lines.</note></topic><topic id="117" parent="113" x="-311.79" y="1147.99" text="Translation"><note>A translation bridge is needed if the two LANs being connected are different types and use different standards and protocols. For example, consider a connection between a Token Ring network and an Ethernet network.</note></topic><topic id="118" parent="113" x="-265.01" y="1195.32" text="Forwarding\Ntable"></topic><topic id="119" parent="118" x="-300.73" y="1264.77" text="transparent\Nbridging"><note>If transparent bridging is used, a bridge starts to learn about the network’s environment as soon as it is powered on and as the network changes. It does this by examining frames and making entries in its forwarding table.
If the bridge receives a request to send a frame to a destination that is not in its forwarding table, it sends out a query frame on each network segment except for the source segment. The destination host is the only one that replies to this query. The bridge updates its table with this computer address and the port to which it is connected, and forwards the frame.</note></topic><topic id="120" parent="118" x="-357.99" y="1220.97" text="static paths"></topic><topic id="121" parent="118" x="-234.01" y="1249.41" text="STA"><note>Spanning Tree Algorithm (STA)
adds more intelligence to the bridges.
- ensures that frames do not circle networks forever,
- provides redundant paths in case a bridge goes down,
- assigns unique identifiers to each bridge,
- assigns priority values to these bridges, and
- calculates path costs
- enables an administrator to indicate whether he wants traffic to travel certain paths instead of others.</note></topic><topic id="122" parent="113" x="-179.77" y="1149.19" text="source routing"><note>The packets hold the forwarding information so they can find their way to their destination without needing bridges and routers to dictate their paths. If the computer wants to dictate its forwarding information, it sends out explorer packets that arrive at the destination computer. These packets contain the route information the packets had to take to get to the destination, including what bridges and/or routers they had to pass through.
The destination computer then sends these packets back to the source computer, and the source computer strips out the routing information, inserts it into the packets, and sends them on to the destination.</note></topic><topic id="123" parent="122" x="-161.83" y="1234.34" text="Caution"><note>External devices and border routers should not accept packets with source routing information within their headers, because that information will override what is laid out in the forwarding and routing tables configured on the intermediate devices. You want to control how traffic traverses your network; you don’t want packets to have this type of control and be able to go wherever they want. Source routing can be used by attackers to get around certain bridge and router filtering rules.</note></topic><topic id="124" parent="110" x="-58.96" y="1188.88" text="Switch"><note>Switches combine the functionality of a repeater and the functionality of a bridge. A switch amplifies the electrical signal, like a repeater, and has the built-in circuitry and intelligence of a bridge.
When a frame comes to a hub, the hub sends the frame out through all of its ports. When a frame comes to a bridge, the bridge sends the frame to the port to which the destination network segment is connected. When a frame comes to a switch, the switch sends the frame directly to the destination computer or network, which results in a reduction of traffic.
When switches are used, contention and collisions are not issues, which results in more efficient use of the network’s bandwidth and decreased latency.</note></topic><topic id="125" parent="124" x="-90.20" y="1235.93" text="L2"><note>Basic switches work at the data link layer and forward traffic based on MAC addresses</note></topic><topic id="126" parent="124" x="-40.37" y="1242.62" text="L3&L4"><note>These switches are referred to as multilayered switches because they combine data link layer, network layer, and other layer functionalities.
A layer 3 switch is basically a router on steroids because it moves the route lookup functionality to the more efficient switching hardware level.(ASIC)</note></topic><topic id="127" parent="126" x="-17.41" y="1285.60" text="Tags"><note>Layer 3 and 4 switches can use tags, which are assigned to each destination network or subnet. When a packet reaches the switch, the switch compares the destination address with its tag information base, which is a list of all the subnets and their corresponding tag numbers. The switch appends the tag to the packet and sends it to the next switch. All the switches in between this first switch and the destination host just review this tag information to determine which route it needs to take, instead of analyzing the full header. Once the packet reaches the last switch, this tag is removed and the packet is sent to the destination. This process increases the speed of routing of packets from one location to another.
Multiprotocol Label Switching (MPLS)</note></topic><topic id="128" parent="126" x="-78.97" y="1289.69" text="VLAN"><note>enable administrators to separate and group computers logically</note></topic><topic id="129" parent="128" x="-101.04" y="1334.46" text="Hopping attack"><note>VLAN hopping attacks allow attackers to gain access to traffic in various VLAN segments. An attacker can have a system act as though it is a switch.
The system understands the tagging values being used in the network and the trunking protocols and can insert itself between other VLAN devices and gain access to the traffic going back and forth.
Attackers can also insert tagging values to manipulate the control of traffic at the data link layer.</note></topic><topic id="130" parent="110" x="-120.44" y="1113.65" text="Router"><note>Routers are layer 3, or network layer, devices that are used to connect similar or different networks.
A router splits up a network into collision domains and broadcast domains. A router gives more of a clear-cut division between network segments than repeaters or bridges. A router should be used if an administrator wants to have more defined control of where the traffic goes, because more sophisticated filtering is available with routers, and when a router is used to segment a network, the result is more controllable sections.
- Creates a new header for each packet
- Builds routing tables based on IP addresses
- Assigns a different network address per port
- Filters traffic based on IP addresses
- Does not forward broadcast packets
- Forwards traffic if a destination address is unknown to the bridge
A router discovers information about routes and changes that take place in a network through its routing protocols (RIP, BGP, OSPF, and others). These protocols tell routers if a link has gone down, if a route is congested, and if another route is more economical. They also update routing tables and indicate if a router is having problems or has gone down.</note></topic><topic id="131" parent="110" x="5.11" y="1180.74" text="Gateway"><note>Gateway is a general term for software running on a device that connects two different environments</note></topic><topic id="132" parent="110" x="33.73" y="1141.73" text="PBX"><note>A Private Branch Exchange (PBX) is a private telephone switch that is located on a company’s property. This switch performs some of the same switching tasks that take place at the telephone company’s central office. The PBX has a dedicated connection to its local telephone company’s central office, where more intelligent switching takes place.
Private Branch Exchange (PBX) A telephone exchange that serves a particular business, makes connections among the internal telephones, and connects them to the public-switched telephone network (PSTN) via trunk lines.</note></topic><topic id="133" parent="110" x="108.95" y="1121.68" text="Firewall"></topic><topic id="134" parent="133" x="49.79" y="1312.92" text="Types"></topic><topic id="135" parent="134" x="264.45" y="1417.00" text="Dynamic packet filtering"><note>The benefit of a dynamic packet-filtering firewall is that it gives you the option of allowing any type of traffic outbound and permitting only response traffic inbound.
An internal system could choose a source port of 11,111 for its message to the outside system. This frame goes to the dynamic packet-filtering firewall, which builds an ACL, that indicates a response from the destination computer to this internal system’s IP address and port 11,111 is to be allowed.
When the destination system sends a response, the firewall allows it. These ACLs are dynamic in nature, so once the connection is finished (either a FIN or RST packet is received), the ACL is removed from the list.
On connectionless protocols, such as UDP, the connection times out and then the ACL is removed.</note></topic><topic id="136" parent="134" x="-5.29" y="1490.98" text="1st gen"></topic><topic id="137" parent="136" x="-25.08" y="1554.95" text="Packet filtering"><note>The first generation of firewalls,
also known as stateless inspection because the device does not understand the context that the packets are working within.
Packet filtering is a firewall technology that makes access decisions based upon network-level protocol header values. The device that is carrying out packet filtering processes is configured with ACLs, which dictate the type of traffic that is allowed into and out of specific networks.
The filters only have the capability of reviewing protocol header information at the network and transport levels.
This means the filters can make access decisions based upon the following basic criteria:
- Source and destination IP addresses
- Source and destination port numbers
- Protocol types
- Inbound and outbound traffic direction
Packet filtering is commonly carried out at the edge of a network to strip out all of the obvious “junk” traffic.</note></topic><topic id="138" parent="137" x="-44.82" y="1618.76" text="Cons"><note>- They cannot prevent attacks that employ application-specific vulnerabilities or functions.
- The logging functionality present in packet filtering firewalls is limited.
- Most packet filtering firewalls do not support advanced user authentication schemes.
- Many packet filtering firewalls cannot detect spoofed addresses.
- They may not be able to detect packet fragmentation attacks.</note></topic><topic id="139" parent="137" x="-125.27" y="1619.54" text="Pros"><note>packet filtering firewalls are scalable,
they are not application dependent, and they have high performance because they do not carry out extensive processing on the packets.
They are commonly used as the first line of defense to strip out all the network traffic that is obviously malicious or unintended for a specific network.</note></topic><topic id="140" parent="134" x="81.67" y="1489.84" text="2nd gen"></topic><topic id="141" parent="140" x="118.38" y="1544.57" text="Proxy"><note>Both types of proxy firewalls deny actual end-to-end connectivity between the source and destination systems.
In attempting a remote connection, the client connects to and communicates with the proxy; the proxy, in turn, establishes a connection to the destination system and makes requests to it on the client’s behalf.</note></topic><topic id="142" parent="141" x="129.89" y="1621.31" text="circuit-level"><note>It works at the session layer,thus, it does not carry out deep-packet inspection. It can only make access decisions based upon protocol header and session information</note></topic><topic id="143" parent="142" x="130.09" y="1663.18" text="SOCKS"><note>SOCKS is an example of a circuit-level proxy gateway that provides a secure channel between two computers. When a SOCKS-enabled client sends a request to access a computer on the Internet, this request actually goes to the network’s SOCKS proxy firewal</note></topic><topic id="144" parent="141" x="239.22" y="1619.18" text="Application-level"><note>Each protocol that is to be monitored must have a unique proxy.
Provides more protection than circuit-level proxy firewalls.
Require more processing per packet and thus are slower than a circuit-level proxy firewall.</note></topic><topic id="145" parent="144" x="247.18" y="1671.98" text="Cons"><note>Disadvantages of using application-level proxy firewalls:
- Are not generally well suited to high-bandwidth or real-time applications.
- Tend to be limited in terms of support for new network applications and protocols.
- Create performance issues because of the necessary per-packet processing requirements.</note></topic><topic id="146" parent="144" x="307.50" y="1663.67" text="Pros"><note>- They have extensive logging capabilities due to the firewall being able to examine the entire network packet rather than just the network addresses and ports.
- Application layer proxy firewalls are capable of authenticating users directly, as opposed to packet filtering firewalls and stateful-inspection firewalls, which can usually only carry out system authentication.
- Since application layer proxy firewalls are not simply layer 3 devices, they can address spoofing attacks and other sophisticated attack</note></topic><topic id="147" parent="141" x="42.86" y="1622.53" text="Kernel proxy"><note>A kernel proxy firewall is considered a fifth-generation firewall. It differs from all the previously discussed firewall technologies because it creates dynamic, customized network stacks when a packet needs to be evaluated.
When a packet arrives at a kernel proxy firewall, a new virtual network stack is created, which is made up of only the protocol proxies necessary to examine this specific packet properly.
The packet is scrutinized at every layer of the stack. This means the data link header will be evaluated along with the network header, transport header, session layer information, and the application layer data. If anything is deemed unsafe at any of these layers, the packet is discarded.</note></topic><topic id="148" parent="147" x="26.36" y="1668.40" text="Cons"><note>Kernel proxy firewalls are faster than application layer proxy firewalls because all of the inspection and processing takes place in the kernel and does not need to be passed up to a higher software layer in the operating system.
It is still a proxy-based system, so the connection between the internal and external entity is broken by the proxy acting as a middleman, and it can perform NAT by changing the source address, as do the preceding proxy-based firewalls.</note></topic><topic id="149" parent="134" x="208.12" y="1483.81" text="3th gen"></topic><topic id="150" parent="149" x="252.31" y="1540.91" text="Stateful"><note>- network layer
- Maintains a state table that tracks each and every communication session
- Provides a high degree of security and does not introduce the performance hit that application proxy firewalls introduce
- Is scalable and transparent to users
- Provides data for tracking connectionless
protocols such as UDP and ICMP
- Stores and updates the state and context of the data within the packets</note></topic><topic id="151" parent="133" x="141.23" y="1266.31" text="Architecture"></topic><topic id="152" parent="151" x="398.75" y="1245.72" text="Screened host\N(Single tiered)"><note>A screened host is a firewall that communicates directly with a perimeter router and the internal network.
- screening device (a router)
- screened host ( a firewall)
If the firewall is an application-based system, protection is provided at the network layer by the router through packet filtering, and at the application layer by the firewall.</note></topic><topic id="153" parent="151" x="244.24" y="1310.76" text="Multihome"><note>multihomed means that several NICs are used to connect several different networks.
A common multihomed firewall architecture allows a company to have several DMZs.
Different DMZs are used for two reasons:
- to control the different traffic types (for example, to make sure HTTP traffic only goes toward the web servers and ensure DNS requests go toward the DNS server),
- and to ensure that if one system on one DMZ is compromised, the other systems in the rest of the DMZs are not accessible to this attacker.</note></topic><topic id="154" parent="151" x="380.59" y="1196.42" text="Screened subnet\N(Two tiered)"><note>A screened-subnet architecture adds another layer of security to the screened-host architecture.
- router
- external FW
- internal FW
The external firewall screens the traffic entering the DMZ network. However, instead of the firewall then redirecting the traffic to the internal network, an interior firewall also filters the traffic. The use of these two physical firewalls creates a DMZ.
The screened-subnet approach provides more protection than a stand-alone firewall or a screened-host firewall because three devices are working together and all three devices must be compromised before an attacker can gain access to the internal network.</note></topic><topic id="155" parent="151" x="167.20" y="1178.81" text="Bastion host"><note>If a system is on the public side of a DMZ or is directly connected to an untrusted network, it is considered a bastion host; thus, it needs to be extremely locked down.
A bastion host does not have to be a firewall—the term just relates to the position of the system in relation to an untrusted environment</note></topic><topic id="156" parent="151" x="332.30" y="1284.35" text="Dual home"><note>Dual-homed refers to a device that has two interfaces: one facing the external network and the other facing the internal network.
- packet forwarding and routing must be turned off, so the incoming packets are processed by the firewall sw</note></topic><topic id="157" parent="151" x="347.19" y="1148.89" text="Virtualized FW"><note>Virtual firewalls can provide bridge-type functionality in which individual traffic links are monitored between virtual machines, or they can be integrated within the hypervisor.</note></topic><topic id="158" parent="133" x="178.00" y="1129.90" text="Attacks"><note>Masquerading, or spoofing, is a popular attacking trick in which the attacker modifies a packet header to have the source address of a host inside the network he wants to attack.
The same can occur in the outgoing traffic - zombies ddos attack - packets are leaving a network with different source addresses
- IP fragmentation Exploitation of fragmentation and reassembly flaws within IP, which causes DoS.
- Teardrop attack Malformed fragments are created by the attacker, and once they are reassembled, they could cause the victim system to become unstable.
- Overlapping fragment attack Used to subvert packet filters that do not reassemble packet fragments before inspection. A malicious fragment overwrites a previously approved fragment and executes an attack on the victim’s system.</note></topic><topic id="159" parent="133" x="-114.63" y="1470.58" text="Rules"></topic><topic id="160" parent="159" x="-151.29" y="1527.80" text="Silent"><note>Drop noisy traffic without logging it. This reduces log sizes</note></topic><topic id="161" parent="159" x="-209.72" y="1518.04" text="Stealth"><note>Disallow access to firewall software from unauthorized systems</note></topic><topic id="162" parent="159" x="-224.30" y="1459.19" text="Cleanup"><note>The last rule in the rule base, which drops and logs any traffic that does not meet the preceding rules</note></topic><topic id="163" parent="159" x="-163.51" y="1423.81" text="Negate"><note>Used instead of the broad and permissive "any rules". Negate rule provide tighter permission rights by specifying what system can be accessed and how</note></topic><topic id="164" parent="110" x="159.14" y="1076.55" text="Proxy"><note>proxy servers are diferenciálu from prózy-báseň firewalls.
Proxy servers act as an intermediary between the clients that want access to certain services and the servers that provide those services.</note></topic><topic id="165" parent="164" x="252.85" y="1096.44" text="Forwarding"><note>A forwarding proxy is one that allows the client to specify the server it wants to communicate with. The proxy server validates that the request is safe and then sends an independent request to the web site on behalf of the user.
An open proxy is a forwarding proxy that is open for anyone to us</note></topic><topic id="166" parent="164" x="244.21" y="1056.85" text="Reverse"><note>A reverse proxy appears to the clients as the original server. The client sends a request to what it thinks is the original server, but in reality this reverse proxy makes a request to the actual server and provides the client with the response.
Forwarding proxy server is commonly on an internal network controlling traffic that is exiting the network.
A reverse proxy server is commonly on the network that fulfills clients’ requests; thus, it is handling traffic that is entering its network.
The reverse proxy can carry out load balancing, encryption acceleration, security, and caching.</note></topic><topic id="167" parent="110" x="248.89" y="1015.18" text="Honeypot"><note>On a smaller scale, companies may choose to implement tarpits,</note></topic><topic id="168" parent="110" x="4.49" y="991.41" text="Unified threat\Nmanagement"><note>provide all (or many) of these functionalities in a single network appliance
firewalls
antimalware
antispam
IDS/IPS
content filtering
data leak prevention
VPN capabilitiy
Possible issues:
- Single point of failure for traffic. Some type of redundancy should be put into place.
- Single point of compromise If the UTM is successfully hacked, there may not have other layers deployed for protection.
- Performance issues Latency and bandwidth issues can arise since this is a “choke point” device that requires a lot of processing.</note></topic><topic id="169" parent="110" x="-105.59" y="1004.47" text="Cloud"><note>Cloud computing
The delivery of computer processing capabilities as a service rather than as a product, whereby shared resources, software, and information are provided to end users as a utility. Offerings are usually bundled as an infrastructure, platform, or software.</note></topic><topic id="170" parent="0" x="336.33" y="906.56" text="Intranets and Extranets"></topic><topic id="171" parent="170" x="292.92" y="952.01" text="Intranet"><note>Intranet
When a company uses web-based technologies inside its networks</note></topic><topic id="172" parent="170" x="369.68" y="952.48" text="Extranet"><note>An extranet
extends outside the bounds of the company’s network to enable two or more companies to share common information and resources. Business partners commonly set up extranets to accommodate business-to-business communication.</note></topic><topic id="173" parent="172" x="425.65" y="953.88" text="EDI"><note>Electronic data interchange (EDI)
provides structure and organization to electronic documents, orders, invoices, purchase orders, and a data flow. EDI has evolved into web-based technologies to provide easy access and easier methods of communication.</note></topic><topic id="174" parent="173" x="426.57" y="997.61" text="VAN"><note>A value-added network (VAN) is an EDI infrastructure developed and maintained by a service bureau.
VAN simplifies the ordering process: instead of an employee having to track down the right supplier and submit a purchase order, this all happens in the background through an automated EDI network, which is managed by a VAN company for use by other companies.</note></topic><topic id="175" parent="0" x="527.91" y="902.39" text="Metropolitan\NArea Networks"><note>A metropolitan area network (MAN) is usually a backbone that connects LANs to each other and LANs to WANs</note></topic><topic id="176" parent="175" x="533.05" y="976.42" text="SONET"><note>SONET
- standard for telecommunications transmissions over fiber-optic cables.
- self-healing, All SONET lines and rings are fully redundant.
- it can transmit voice, video, and data over optical networks.
- Slower-speed SONET networks often feed into larger, faster SONET networks</note></topic><topic id="177" parent="175" x="613.01" y="990.62" text="FDDI"><note>FDDI is a LAN and MAN technology, usually used for backbones, that uses token-passing technology and has redundant rings in case the primary ring goes down</note></topic><topic id="178" parent="175" x="678.75" y="947.36" text="Metro Ethernet"><note>Ethernet on the MAN can be used as pure Ethernet or Ethernet integrated with other networking technologies, as in MPLS. Pure Ethernet is less expensive, but less reliable and scalable. MPLS-based deployments are more expensive but highly reliable and scalable, and are typically used by large service providers.</note></topic><topic id="179" parent="0" x="863.22" y="899.99" text="Wide Area Networks"></topic><topic id="180" parent="179" x="811.65" y="1359.03" text="Multiplexing"><note>Multiplexing is a method of combining multiple channels of data over a single transmission line.</note></topic><topic id="181" parent="180" x="856.76" y="1399.13" text="STDM"><note>Statistical time-division multiplexing (STDM) Transmitting several types of data simultaneously across a single transmission line. STDM technologies analyze statistics related to the typical workload of each input device and make real-time decisions on how much time each device should be allocated for data transmission.</note></topic><topic id="182" parent="180" x="806.57" y="1397.30" text="TDM"><note>Time-division multiplexing (TDM) A type of multiplexing in which two or more bit streams or signals are transferred apparently simultaneously as subchannels in one communication channel, but are physically taking turns on the single channel.</note></topic><topic id="183" parent="180" x="882.65" y="1358.83" text="WDM"><note>Wave-division multiplexing (WDM) Multiplying the available capacity of optical fibers through use of parallel channels, with each channel on a dedicated wavelength of light. The bandwidth of an optical fiber can be divided into as many as 160 channels.</note></topic><topic id="184" parent="180" x="863.05" y="1314.70" text="FDM"><note>Frequency-division multiplexing (FDM) Dividing available bandwidth into a series of nonoverlapping frequency sub-bands that are then assigned to each communicating source and user pair. FDM is inherently an analog technology.</note></topic><topic id="185" parent="179" x="968.30" y="923.58" text="Carriers"></topic><topic id="186" parent="185" x="1023.68" y="895.45" text="T"><note>T-carriers are dedicated lines that can carry voice and data information over trunk lines.
- developed by AT&T and were
- initially implemented in the early 1960s to support pulse-code modulation (PCM) voice transmission.
T1 line, which can multiplex up to 24 channels. Each channel gets to insert up to eight bits into its established time slot.
8,000 frames are built per second.
T1 - 24 channels - 1.544 Mbps
T2 - 96 channels - 6,312 Mbps
T3 - 672 channels - 44,736 Mbps
T4 - 4032 channels - 274,760 Mbps</note></topic><topic id="187" parent="185" x="1023.40" y="940.58" text="E"><note>E-carriers are similar to T-carrier telecommunication connections, where a single physical wire pair can be used to carry many simultaneous voice conversations by time-division multiplexing.
Within this technology 30 channels interleave eight bits of data in a frame. While the T-carrier and E-carrier technologies are similar, they are not interoperable.
E-carriers are used by European countries.
E0 - 64 Kbit/s
E1 - 2.048 Mbit/s
E2 - 8.448 Mbit/s
E3 - 34.368 Mbit/s
E4 - 139.264 Mbit/s
E5 - 565.148 Mbit/s</note></topic><topic id="188" parent="185" x="973.57" y="867.19" text="Optical"><note>OC-1 - 51.84 Mbps
OC-3 - 155.52 Mbps
OC-9 - 466.56 Mbps
OC-12 - 622.08 Mbps
OC-19 - 933.12 Mbps
OC-24 - 1.244 Gbps
OC-36 - 1.866 Gbps
OC-48 - 2.488 Gbps
OC-96 - 4.977 Gbps
OC-192 - 9.953 Gbps
OC-768 - 40 Gbps
OC-3072 - 160 Gbps</note></topic><topic id="189" parent="179" x="925.70" y="1193.95" text="Switching"></topic><topic id="190" parent="189" x="968.02" y="1135.00" text="Circuit"><note>Circuit switching sets up a virtual connection that acts like a dedicated link between two systems. ISDN and telephone calls are examples of circuit switching.
- Connection-oriented virtual links.
- Traffic travels in a predictable and constant manner.
- Fixed delays.
- Usually carries voice-oriented data.</note></topic><topic id="191" parent="190" x="973.28" y="1099.88" text="ISDN"></topic><topic id="192" parent="189" x="990.50" y="1247.77" text="Packet"><note>Packet switching does not set up a dedicated virtual link, and packets from one connection can pass through a number of different individual devices.
The infrastructure that supports these methods is made up of routers and switches of different types. They provide multiple paths to the same destinations, which offers a high degree of redundancy.
- Packets can use many different dynamic paths to get to the same destination.
- Traffic is usually bursty in nature.
- Variable delays.
- Usually carries data-oriented data.</note></topic><topic id="193" parent="192" x="1049.93" y="1317.35" text="Frame Relay"><note>Frame relay is connection-oriented switching WAN technology that operates at the data link layer.
The frame relay cost is based on the amount of bandwidth used. Because several companies and networks use the same medium and devices (routers and switches), the cost can be greatly reduced per company compared to dedicated links.
Company can pay a committed information rate, or CIR, in order to ensure that a higher level of bandwidth will be always available.
Two main types of equipment are used in frame relay connections: DTE and DCE.</note></topic><topic id="194" parent="193" x="1051.85" y="1403.18" text="DTE"><note>The DTE is usually a customer-owned device, such as a router or switch, that provides connectivity between the company’s own network and the frame relay network.</note></topic><topic id="195" parent="193" x="1091.01" y="1381.47" text="DCE"><note>DCE is the service provider’s device, or telecommunications company’s device, that does the actual data transmission and switching in the frame relay cloud. So the DTE is a company’s ramp onto the frame relay network, and the DCE devices actually do the work within the frame relay cloud.
The frame relay cloud is the collection of DCEs that provides switching and data communications functionality.
The frames will be sent either through permanent or switched virtual circuits that are defined within the DCE or through carrier switches.</note></topic><topic id="196" parent="192" x="935.13" y="1297.30" text="X.25"><note>X.25 is a switching technology that uses carrier switches to provide connectivity for many different networks. It also provides an any-to-any connection, meaning many users use the same service simultaneously. Subscribers are charged based on the amount of bandwidth they use, unlike dedicated links, for which a flat fee is charged.
Data are divided into 128 bytes and encapsulated in High-level Data Link Control (HDLC) frames. The frames are then addressed and forwarded across the carrier switches.</note></topic><topic id="197" parent="192" x="959.14" y="1431.44" text="Virtual circuits"><note>Frame relay (and X.25) forwards frames across virtual circuits. These circuits can be either permanent, meaning they are programmed in advance, or switched, meaning the circuit is quickly built when it is needed and torn down when it is no longer needed.</note></topic><topic id="198" parent="197" x="938.65" y="1501.81" text="SVC"><note>Switched virtual circuits (SVCs) require steps similar to a dial-up and connection procedure. The difference is that a permanent path is set up for PVC frames, whereas when SVCs are used, a circuit must be built. It is similar to setting up a phone call over the public network. During the setup procedure, the required bandwidth is requested, the destination computer is contacted and must accept the call, a path is determined, and forwarding information is programmed into each switch along the SVC’s path.
SVCs are used for teleconferencing, establishing temporary connections to remote sites, data replication, and voice calls. Once the connection is no longer needed, the circuit is torn down and the switches forget it ever existed.
Although a . If a customer wants to use her PVC for a temporary connection, as mentioned earlier, she must call the carrier and have it set up, which can take hours.</note></topic><topic id="199" parent="197" x="984.47" y="1496.15" text="PVC"><note>The permanent virtual circuit (PVC) works like a private line for a customer with an agreed-upon bandwidth availability. When a customer decides to pay for the committed rate, a PVC is programmed for that customer to ensure it will always receive a certain amount of bandwidth.
PVC provides a guaranteed level of bandwidth, but it does not have the flexibility of an SVC.</note></topic><topic id="200" parent="192" x="1064.81" y="1261.03" text="SMDS"><note>Switched Multimegabit Data Service (SMDS) is a high-speed packet-switched technology used to enable customers to extend their LANs across MANs and WANs.
This protocol is connectionless and can provide bandwidth on demand.
Although some companies still use this technology, it has been largely replaced with other WAN technologies.
Service providers usually maintain only the networks that currently use this technology instead of offering it to new customers. This is an antiquated WAN technology.</note></topic><topic id="201" parent="189" x="994.73" y="1199.29" text="Cell"></topic><topic id="202" parent="201" x="1039.25" y="1180.65" text="ATM"><note>Asynchronous Transfer Mode (ATM) is connection-oriented switching technology, which uses a cell-switching method.
The data are segmented into fixed-size cells of 53 bytes, instead of variable-size packets. This provides for more efficient and faster use of the communication paths. ATM sets up virtual circuits, which act like dedicated paths between the source and destination. These virtual circuits can guarantee bandwidth and QoS. For these reasons, ATM is a good carrier for voice and video transmission.
ATM was the first protocol to provide true QoS</note></topic><topic id="203" parent="202" x="1083.88" y="1218.01" text="QoS"><note>Quality of Service (QoS) is a capability that allows a protocol to distinguish between different classes of messages and assign priority levels.
QoS allows a service provider to guarantee a level of service to its customers. QoS began with ATM and then was integrated into other technologies and protocols responsible for moving data from one place to another. Four different types of ATM QoS services (listed next) are available to customers. Each service maps to a specific type of data that will be transmitted.</note></topic><topic id="204" parent="203" x="1155.89" y="1214.26" text="Best-effort"><note>Best-effort service
- No guarantee of throughput, delay, or delivery. - - Traffic that has priority classifications goes before traffic that has been assigned this classification.
- Most of the traffic that travels on the Internet has this classification.</note></topic><topic id="205" parent="203" x="1156.79" y="1172.15" text="Differentiated"><note>Differentiated service
Compared to best-effort service, traffic that is assigned this classification has more bandwidth, shorter delays, and fewer dropped frames.</note></topic><topic id="206" parent="203" x="1096.05" y="1138.70" text="Guaranteed"><note>Ensures specific data throughput at a guaranteed speed. Time-sensitive traffic (voice and video) is assigned this classification</note></topic><topic id="207" parent="179" x="971.40" y="1043.02" text="Dedicated\NPoint-to-point"></topic><topic id="208" parent="207" x="1046.20" y="1024.47" text="SDLC"><note>Synchronous Data Link Control (SDLC) is a protocol used in networks that use dedicated, leased lines with permanent physical connections. It is used mainly for communications with IBM hosts within a Systems Network Architecture (SNA). Developed by IBM in the 1970s, SDLC is a bit-oriented, synchronous protocol that has evolved into other communication protocols, such as HDLC, Link Access Procedure (LAP), and Link Access Procedure-Balanced (LAPB).
- Enables mainframes to communicate with remote offices
- Provides a polling mechanism to allow primary and secondary stations to communicate</note></topic><topic id="209" parent="207" x="1006.06" y="987.18" text="HDLC"><note>HDLC
High-level Data Link Control (HDLC) is a protocol that is also a bit-oriented link layer protocol and is used for serial device-to-device WAN communication.
HDLC is an extension of SDLC, which was mainly used in SNA environments. SDLC basically died out as the mainframe environments using SNA reduced greatly in numbers. HDLC stayed around and evolved.
- Data encapsulation method for synchronous serial links
- Point-to-point and multipoint communication</note></topic><topic id="210" parent="207" x="1039.45" y="1084.77" text="PPP"><note>Point-to-point protocol (PPP) is similar to HDLC in that it is a data link protocol that carries out framing and encapsulation for point-to-point connections.
Telecommunication devices commonly use PPP as their data link protocol.
PPP carries out several functions :
- encapsulation of multiprotocol packets; it has a Link Control Protocol (LCP) that establishes, configures, and maintains the connection; Network Control Protocols (NCPs) are used for network layer protocol configuration
- provides user authentication capabilities through Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), and Extensible Authentication Protocol (EAP) protocols</note></topic><topic id="211" parent="210" x="1090.64" y="1055.88" text="LCP"><note>The LCP is used to carry out the encapsulation format options, handle varying limits on sizes of packets, detect a looped-back link and other common misconfiguration errors, and terminate the link when necessary.
LCP is the generic maintenance component used for each and every connection. So LCP makes sure the foundational functions of an actual connection work properly.</note></topic><topic id="212" parent="210" x="1088.97" y="1100.98" text="NCP"><note>NCP makes sure that PPP can integrate and work with many different protocols. If PPP just moved IP traffic from one place to the other, it would not need NCPs. PPP has to “plug in” and work with different network layer protocols, and various network layer protocol configurations have to change as a packet moves from one network to another one.
So PPP uses NCPs to be able to understand and work with different network layer protocols (IP, IPX, NetBEUI, AppleTalk).</note></topic><topic id="213" parent="179" x="808.03" y="847.47" text="HSSI"><note>HSSI
High-Speed Serial Interface (HSSI) is an interface used to connect multiplexers and routers to high-speed communications services such as ATM and frame relay. It supports speeds up to 52 Mbps, as in T3 WAN connections, which are usually integrated with router and multiplex devices to provide serial interfaces to the WAN. These interfaces define the electrical and physical interfaces to be used by DTE/DCE devices; thus, HSSI works at the physical layer.</note></topic><topic id="214" parent="179" x="644.16" y="1367.27" text="Multiservice access \Ntechnologies"><note>Multiservice access technologies combine several types of communication categories (data, voice, and video) over one transmission line. This provides higher performance, reduced operational costs, and greater flexibility, integration, and control for administrators.</note></topic><topic id="215" parent="214" x="648.30" y="1429.12" text="VoIP"><note>VoIP is a packet-oriented switching technology,</note></topic><topic id="216" parent="215" x="648.81" y="1514.83" text="SIP"><note>Session Initiation Protocol (SIP) sets up and breaks down the call sessions, just as SS7 does for non-IP phone calls.
SIP is an application layer protocol that can work over TCP or UDP. SIP provides the foundation to allow the more complex phone-line features that SS7 provides, such as causing a phone to ring, dialing a phone number, generating busy signals, and so on.
three-way-handshake:
1. System A starts by sending an INVITE packet to system B. Since Bill’s system is unaware of John’s location, the INVITE packet is sent to the SIP server, which looks up John’s address in the SIP registrar server. Once the location of John’s system has been determined, the INVITE packet is forwarded to him. During this entire process, the server keeps the caller (Bill) updated by sending him a TRYING packet, indicating the process is underway. Once the INVITE packet reaches John’s system, it starts ringing. While John’s system rings and waits for John to respond, it sends a RINGING packet to Bill’s system, notifying Bill that the INVITE packet has been received and John’s system is waiting for John to accept the call. As soon as John answers the call, an OK packet is sent to Bill’s system (through the server). Bill’s system now issues an ACK packet to begin call setup</note></topic><topic id="217" parent="216" x="658.40" y="1581.37" text="UAC"><note>The UAC is the application that creates the SIP requests for initiating a communication session. UACs are generally messaging tools and soft-phone applications that are used to place VoIP calls.
. It is important to note here that SIP itself is not used to stream the conversation because it’s just a signaling protocol. The actual voice stream is carried on media protocols such as the Real-time Transport Protocol (RTP). RTP provides a standardized packet format for delivering audio and video over IP networks. Once Bill and John are done communicating, a BYE message is sent from the system terminating the call. The other system responds with an OK, acknowledging the session has ended. This handshake is illustrated in Figure 6-71.</note></topic><topic id="218" parent="216" x="594.34" y="1539.81" text="UAS"><note>The UAS is the SIP server, which is responsible for handling all routing and signaling involved in VoIP calls.</note></topic><topic id="219" parent="215" x="723.97" y="1477.20" text="main components"><note>- IP telephony device
- call-processing manager
- voicemail system
- voice gateway.
The IP telephony device
is just a phone that has the necessary software that allows it to work as a network device.
In VoIP, the phone must be “smart” by having the necessary software to take analog signals, digitize them, break them into packets, and create the necessary headers and trailers for the packets to find their destination.
The voicemail system
is a storage place for messages and provides user directory lookups and call-forwarding functionality.
A voice gateway carries out packet routing and provides access to legacy voice systems and backup calling processes.
1. Phone will send a message to the call-processing manager to indicate a call needs to be set up.
2. When the person at the destination takes her phone off the hook, this notifies the call-processing manager that the call has been accepted.
3. The call-processing manager notifies both the sending and receiving phones that the channel is active, and voice data are sent back and forth over a traditional data network line.</note></topic><topic id="220" parent="219" x="720.09" y="1531.35" text="Servers"><note>The SIP architecture consists of three different types of servers, which play an integral role in the entire communication process of the VoIP system.
1. proxy server
is used to relay packets within a network between the UACs and the UAS. It also forwards requests generated by callers to their respective recipients. Proxy servers are also generally used for name mapping, which allows the proxy server to interlink an external SIP system to an internal SIP client.
2. registrar server
keeps a centralized record of the updated locations of all the users on the network. These addresses are stored on a location server.
3. redirect server
The redirect server allows SIP devices to retain their SIP identities despite changes in their geographic location. This allows a device to remain accessible when its location is physically changed and hence while it moves through different networks. The use of redirect servers allows clients to remain within reach while they move through numerous network coverage zones. This configuration is generally known as an intraorganizational configuration. Intraorganizational routing enables SIP traffic to be routed within a VoIP network without being transmitted over the PSTN or external network.</note></topic><topic id="221" parent="215" x="722.45" y="1419.81" text="Streaming"><note>RTP is a session layer protocol that carries data in media stream format, as in audio and video, and is used extensively in VoIP, telephony, video conferencing, and other multimedia streaming technologies.
It provides end-to-end delivery services and is commonly run over the transport layer protocol UDP.
RTP Control Protocol (RTCP) is used in conjunction with RTP and is also considered a session layer protocol. It provides out-of-band statistics and control information to provide feedback on QoS levels of individual streaming multimedia sessions.</note></topic><topic id="222" parent="215" x="581.42" y="1480.42" text="Security"><note>Hackers can intercept incoming and outgoing calls, carry out DoS attacks, spoof phone calls, and eavesdrop on sensitive conversations.
Countermeasures:
1. Keep patches updated on each network device involved with VoIP transmissions:
- The call manager server.
- The voicemail server.
- The gateway server.
2. Identify unidentified or rogue telephony devices:
- Implement authentication so only authorized telephony devices are working on the network.
- Install and maintain:
--Stateful firewalls.
--VPN for sensitive voice data.
--Intrusion detection.
3. Disable unnecessary ports and services on routers, switches, PCs, and IP telephones.
4. Employ real-time monitoring that looks for attacks, tunneling, and abusive call patterns through IDS/IPS.
5. Employ content monitoring.
- Use encryption when data (voice, fax, video) cross an untrusted network.
- Use a two-factor authentication technology.
- Limit the number of calls via media gateways.
- Close the media sessions after completion.</note></topic><topic id="223" parent="0" x="1192.80" y="829.86" text="Remote Connectivity"></topic><topic id="224" parent="223" x="1199.81" y="888.73" text="Dial-up"><note>Like most telecommunication connections, dial-up connections take place over PPP, which has authentication capabilities.
Authentication should be enabled for the PPP connections, but another layer of authentication should be in place before users are allowed access to network resources.
This second layer of authentication could be done through the use of TACACS+ or RADIUS</note></topic><topic id="225" parent="223" x="1259.22" y="881.97" text="ISDN"></topic><topic id="226" parent="223" x="1134.96" y="885.19" text="PPTP"><note>Point-to-Point Tunneling Protocol (PPTP):
- Works in a client/server model
- Extends and protects PPP connections
- Works at the data link layer
- Transmits over IP networks only
- can be used for dial-up connection</note></topic><topic id="227" parent="223" x="1074.98" y="863.48" text="L2TP"><note>Layer 2 Tunneling Protocol (L2TP):
- Hybrid of L2F and PPTP
- Extends and protects PPP connections
- Works at the data link layer
- Transmits over multiple types of networks, not just IP
Combined with IPSec for security
- it cannot be used with dial-up connection</note></topic><topic id="228" parent="223" x="1069.95" y="790.42" text="IPSec"><note>IPSec
- Handles multiple VPN connections at the same time
- Provides secure authentication and encryption
- Supports only IP networks
- Focuses on LAN-to-LAN communication rather than user-to-user
- Works at the network layer, and provides security on top of IP
The main protocols:
- Authentication Header (AH)
provides data integrity, data origin authentication, and protection from replay attacks.
- Encapsulating Security Payload (ESP) provides confidentiality, data-origin authentication, and data integrity.
- Internet Security Association and Key Management Protocol (ISAKMP) provides a framework for security association creation and key exchange.
- Internet Key Exchange (IKE) provides authenticated keying material for use with ISAKMP.</note></topic><topic id="229" parent="228" x="1096.14" y="728.70" text="Tunnel mode"><note>Protects the payload and the header information of a packet</note></topic><topic id="230" parent="228" x="992.12" y="732.08" text="Transport mode"><note>Protects only the payload</note></topic><topic id="231" parent="223" x="1151.35" y="783.53" text="SSL"><note>SSL
- Works at the transport layer and protects mainly web-based traffic
- Granular access control and configuration are available
- Easy deployment since SSL is already embedded into web browsers
- Can only protect a small number of protocol types, thus is not an infrastructure-level VPN solution</note></topic><topic id="232" parent="223" x="1328.73" y="828.38" text="Authentication"></topic><topic id="233" parent="232" x="1428.21" y="827.30" text="PAP"><note>Password Authentication Protocol (PAP)
is used by remote users to authenticate over PPP connections.
The password and the username credentials are sent over the network to the authentication server after a connection has been established via PPP. The authentication server has a database of user credentials that are compared to the supplied credentials to authenticate users.
PAP is one of the least secure authentication methods because the credentials are sent in cleartext
PAP is vulnerable to sniffing because it sends the password and data in plaintext, but it is also vulnerable to man-in-the-middle attacks.</note></topic><topic id="234" parent="232" x="1429.62" y="866.28" text="CHAP"><note>Challenge Handshake Authentication Protocol (CHAP)
uses a challenge/response mechanism to authenticate the user instead of sending a password
- the user’s computer sends the authentication server a logon request.
- The server sends the user a challenge (nonce), which is a random value.
- This challenge is encrypted with the use of a predefined password as an encryption key, and - - the encrypted challenge value is returned to the server.
CHAP is not vulnerable to man-in-the-middle attacks because it continues this challenge/response activity throughout the connection to ensure the authentication server is still communicating with a user who holds the necessary credentials.</note></topic><topic id="235" parent="232" x="1422.80" y="902.55" text="EAP"><note>Extensible Authentication Protocol (EAP)
is not a specific authentication protocol as are PAP and CHAP.
Instead, it provides a framework to enable many types of authentication techniques to be used when establishing network connections.
It extends the authentication possibilities from the norm (PAP and CHAP) to other methods, such as one-time passwords, token cards, biometrics, Kerberos, digital certificates, and future mechanisms.
EAP has been defined for use with a variety of technologies and protocols, including PPP, PPTP, L2TP, IEEE 802 wired networks, and wireless technologies such as 802.11 and 802.16.
There are many variants of EAP.</note></topic><topic id="236" parent="235" x="1447.45" y="964.34" text="PEAP"><note>Protected extensible authentication protocol
Is a version of EAP used in wireless networks and point-to-point connections.
It is designed to provide authentication for 802.11 WLANs, which support 802.1x port access control and TLS.
It is a protocol that encapsulate EAP within a potentially encrypted and authenticated TLS tunnel.</note></topic><topic id="237" parent="232" x="1328.13" y="962.53" text="802.1X"><note>The 802.1x standard is a port-based access control that ensures a user cannot make a full network connection until he is properly authenticated.</note></topic><topic id="238" parent="237" x="1327.83" y="1028.27" text="802.1 AE"><note>Provides data encryption, integrity, and origin authentication functionality at the data link level</note></topic><topic id="239" parent="237" x="1395.48" y="1027.18" text="802.1 AF"><note>Carries out key agreement functions for session keys used for data encryption</note></topic><topic id="240" parent="237" x="1242.66" y="1029.09" text="802.1 AR"><note>Provides unique ID for a device</note></topic><topic id="241" parent="0" x="1740.02" y="808.03" text="Wireless Technologies"></topic><topic id="242" parent="241" x="1740.45" y="759.35" text="Spread Spectrum"><note>the sender spreads its data across the frequencies over which it has permission to communicate.
Spreading the signal allows the data to travel in a parallel fashion by allowing the sender and receiver to send data over more than one frequency.</note></topic><topic id="243" parent="242" x="1741.05" y="693.61" text="FHSS"><note>Frequency hopping spread spectrum
FHSS moves data by changing frequencies.</note></topic><topic id="244" parent="243" x="1741.65" y="627.87" text="802.11"><note>The first wireless WAN standard, 802.11, used FHSS, but as bandwidth requirements increased, DSSS was implemented
By using FHSS, the 802.11 standard can provide a data throughput of only 1 to 2 Mbps.</note></topic><topic id="245" parent="242" x="1797.98" y="692.76" text="DSSS"><note>Direct sequence spread spectrum (DSSS) takes a different approach by applying sub-bits (chips) to a message. The sub-bits are used by the sending system to generate a different format of the data before the data are transmitted. The receiving end uses these sub-bits ( chipping code) to reassemble the signal into the original data format.
The DSSS technology uses all of the available bandwidth continuously. DSSS spreads the signals over a wider frequency band, whereas FHSS uses a narrow band carrier.
Since DSSS sends data across all frequencies at once, it has a higher data throughput than FHSS.</note></topic><topic id="246" parent="245" x="1800.98" y="647.46" text="802.11b"><note>By using DSSS instead, 802.11b provides a data throughput of up to 11 Mbps.</note></topic><topic id="247" parent="242" x="1661.05" y="678.54" text="OFDM"><note>Orthogonal frequency-division multiplexing (OFDM)
is a digital multicarrier modulation scheme that compacts multiple modulated carriers tightly together, reducing the required bandwidth.
The modulated signals are orthogonal (perpendicular) and do not interfere with each other. OFDM uses a composite of narrow channel bands to enhance its performance in high-frequency bands.
OFDM is officially a multiplexing technology and not a spread spectrum technology, but is used in a similar manner.
OFDM is a modulation scheme that splits a signal over several narrowband channels. The channels are then modulated and sent over specific frequencies. Because the data are divided across these different channels, any interference from the environment will degrade only a small portion of the signal. This allows for greater throughput.
OFDM is a physical layer specification. It can be used to transmit highdefinition digital audio and video broadcasting as well as WLAN traffic.
This technology offers advantages in two areas: speed and frequency</note></topic><topic id="248" parent="247" x="1663.12" y="630.73" text="802.11a"></topic><topic id="249" parent="241" x="1871.50" y="811.15" text="Components"></topic><topic id="250" parent="249" x="1945.30" y="812.76" text="AP"><note>Access point (AP)
connects to an Ethernet cable that is the link wireless devices use to access resources on the wired network</note></topic><topic id="251" parent="250" x="1997.81" y="814.35" text="SSID"></topic><topic id="252" parent="249" x="1935.23" y="877.97" text="Authentication"></topic><topic id="253" parent="252" x="2035.88" y="921.57" text="OSA"><note>Open system authentication
OSA does not require the wireless device to prove to the AP it has a specific cryptographic key to allow for authentication purposes. In many cases, the wireless device needs to provide only the correct SSID value. In OSA implementations, all transactions are in cleartext because no encryption is involved. So an intruder can sniff the traffic, capture the necessary steps of authentication, and walk through the same steps to be authenticated and associated to an AP.</note></topic><topic id="254" parent="252" x="2034.61" y="880.33" text="SKA"><note>Shared key authentication
When an AP is configured to use SKA, the AP sends a random value to the wireless device. The device encrypts this value with its cryptographic key and returns it. The AP decrypts and extracts the response, and if it is the same as the original value, the device is authenticated. In this approach, the wireless device is authenticated to the network by proving it has the necessary encryption key.
This method is based on the Wired Equivalent Privacy (WEP) protocol, which also enables data transfers to be encrypted.</note></topic><topic id="255" parent="252" x="1950.88" y="942.44" text="EAP-TLS"><note>The client and server authenticate to each other using digital certificates.
The client generates a pre-mastered secret key by encrypting a random number with the server's public key and sends it to the server</note></topic><topic id="256" parent="252" x="2040.57" y="988.41" text="EAP-TTLS"><note>Similar to EAP-TLS, but only the server must use a digital certification for authentication to the client.
The client can use any other EAP auth method or legacy PAP or CHAP</note></topic><topic id="257" parent="241" x="1797.50" y="873.92" text="Security"></topic><topic id="258" parent="257" x="1843.81" y="927.01" text="WEP"><note>The three core deficiencies with WEP are:
- the use of static encryption keys
- the ineffective use of initialization vectors
- lack of packet integrity assurance.
The WEP protocol uses the RC4 algorithm, which is a stream-symmetric cipher.</note></topic><topic id="259" parent="257" x="1779.01" y="938.66" text="802.11i"></topic><topic id="260" parent="259" x="1829.49" y="982.63" text="TKIP"><note>Temporal Key Integrity Protocol
TKIP was developed by the IEEE 802.11i task group and the Wi-Fi Alliance. The goal of this protocol was to increase the strength of WEP or replace it fully without the need for hardware replacement.
TKIP addresses the deficiencies of WEP pertaining to static WEP keys and inadequate use of IV values.
TKIP actually works with WEP by feeding it keying material, which is data to be used for generating new dynamic keys. The new standard also integrated 802.1X port authentication and EAP authentication methods.
TKIP also deals with the integrity issues by using a MIC instead of an ICV function.</note></topic><topic id="261" parent="259" x="1770.28" y="991.14" text="CCMP"><note>encryption protection with the use of the AES algorithm in counter mode with CBC-MAC (CCM), which is referred to as the CCM Protocol (CCMP). AES is a more appropriate algorithm for wireless than RC4 and provides a higher level of protection.</note></topic><topic id="262" parent="241" x="1888.54" y="734.84" text="Standards"></topic><topic id="263" parent="262" x="1993.46" y="765.44" text="802.11b"><note>This standard was the first extension to the 802.11 WLAN standard. (Although 802.11a was conceived and approved first, it was not released first because of the technical complexity involved with this proposal.)
802.11b provides a transfer rate of up to 11 Mbps and works in the 2.4GHz frequency range. It uses DSSS and is backward-compatible with 802.11 implementations.</note></topic><topic id="264" parent="262" x="2026.54" y="728.85" text="802.11a"><note>This standard uses a different method of modulating data onto the necessary radio carrier signals.
802.11a uses OFDM and works in the 5GHz frequency band. Because of these differences, 802.11a is not backward-compatible with 802.11b or 802.11.
802.11a provides up to 54 Mbps, the maximum speed for 802.11a is attained at short distances from the AP, up to 25 feet.</note></topic><topic id="265" parent="262" x="2052.93" y="692.39" text="802.11e"><note>This standard has provided QoS and support of multimedia traffic in wireless transmissions. Multimedia and other types of time-sensitive applications have a lower tolerance for delays in data transmission. QoS provides the capability to prioritize traffic and affords guaranteed delivery. This specification and its capabilities have opened the door to allow many different types of data to be transmitted over wireless connections.</note></topic><topic id="266" parent="265" x="2115.71" y="698.53" text="QoS"></topic><topic id="267" parent="262" x="2055.32" y="652.31" text="802.11f"><note>When a user moves around in a WLAN, her wireless device often needs to communicate with different APs. An AP can cover only a certain distance, and as the user moves out of the range of the first AP, another AP needs to pick up and maintain her signal to ensure she does not lose network connectivity. This is referred to as roaming, and for this to happen seamlessly, the APs need to communicate with each other. If the second AP must take over this user’s communication, it will need to be assured that this user has been properly authenticated and must know the necessary settings for this user’s connection. This means the first AP would need to be able to convey this information to the second AP. The conveying of this information between the different APs during roaming is what 802.11f deals with. It outlines how these data can be properly shared.</note></topic><topic id="268" parent="267" x="2120.74" y="650.60" text="Roaming"></topic><topic id="269" parent="262" x="2055.73" y="616.24" text="802.11g"><note>The 802.11g standard provides for higher data transfer rates—up to 54 Mbps. This is basically a speed extension for 802.11b products.
But 802.11g still works in the 2.4GHz range, which is continually getting more crowded.
But working at higher frequency means a device’s signal cannot cover as wide a range.</note></topic><topic id="270" parent="262" x="2031.02" y="579.94" text="802.11h"><note>The 802.11h standard builds upon the 802.11a specification to meet the requirements of European wireless rules so products working in this range can be properly implemented in European countries.</note></topic><topic id="271" parent="262" x="1987.77" y="541.21" text="802.11j"><note>Many countries have been developing their own wireless standards, which inevitably causes massive interoperability issues. This can be frustrating for the customer because he cannot use certain products, and it can be frustrating and expensive for vendors because they have a laundry list of specifications to meet if they want to sell their products in various countries. If vendors are unable to meet these specifications, whole customer bases are unavailable to them. The 802.11j task group has been working on bringing together many of the different standards and streamlining their development to allow for better interoperability across borders.</note></topic><topic id="272" parent="271" x="2024.99" y="496.23" text="Interoperability"></topic><topic id="273" parent="262" x="1917.49" y="527.07" text="802.11n"><note>802.11n is designed to be much faster, with throughput at 100 Mbps, and it works at the same frequency range as 802.11a (5GHz). The intent is to maintain some backward-compatibility with current Wi-Fi standards, while combining a mix of the current technologies. This standard uses a concept called multiple input, multiple output (MIMO) to increase the throughput. This requires the use of two receive and two transmit antennas to broadcast in parallel using a 20MHz channel.</note></topic><topic id="274" parent="273" x="1917.85" y="485.10" text="MIMO"></topic><topic id="275" parent="262" x="1860.49" y="547.37" text="802.16"><note>This technology is also referred to as broadband wireless access. (A commercial technology that is based upon 802.16 is WiMAX.)</note></topic><topic id="276" parent="275" x="1842.42" y="499.91" text="WiMAX"></topic><topic id="277" parent="262" x="1835.92" y="589.87" text="802.15"><note>wireless personal area network (WPAN). This technology allows for connectivity to take place among local devices, such as a computer communicating with a wireless keyboard, a cellular phone communicating with a computer, or a headset communicating with another device. The goal here—as with all wireless technologies—is to allow for data transfer without all of those pesky cables.</note></topic><topic id="278" parent="277" x="1781.26" y="543.92" text="BT"><note>The Bluetooth wireless technology is actually based upon a portion of the 802.15 standard. It has a 1-to 3-Mbps transfer rate and works in a range of approximately ten meters.</note></topic><topic id="279" parent="241" x="1667.32" y="867.47" text="Mobile"></topic><topic id="280" parent="279" x="1593.59" y="921.68" text="Multiple access"></topic><topic id="281" parent="280" x="1534.93" y="972.09" text="FDMA"><note>Frequency division multiple access
was the earliest multiple access technology put into practice.
The available frequency range is divided into sub-bands (channels), and one channel is assigned to each subscriber (cell phone).
The subscriber has exclusive use of that channel while the call is made, or until the call is terminated or handed off; no other calls or conversations can be made on that channel during that call.
- Advanced Mobile Phone System (AMPS)
- Total Access Communication System (TACS),
- Nordic Mobile Telephone (NMT)</note></topic><topic id="282" parent="281" x="1526.89" y="1013.65" text="1G"><note>Analog services
Voice service only</note></topic><topic id="283" parent="280" x="1590.30" y="970.82" text="TDMA"><note>Time division multiple access
increases the speed and efficiency by taking the radio-frequency spectrum channels and dividing them into time slots.
At various time periods, multiple users can share the same channel; the systems within the cell swap from one user to another user, in effect, reusing the available frequencies.
Time is divided into frames. Each frame is divided into slots. TDMA requires that each slot’s start and end time are known to both the source and the destination.
Mobile communication systems such as Global System for Mobile Communication (GSM), Digital AMPS (D-AMPS), and Personal Digital Cellular (PDC) use TDMA.</note></topic><topic id="284" parent="283" x="1590.59" y="1014.15" text="2G"><note>Primarily voice, some low-speed data (circuit switched)
Phones were smaller in size
Added functionality of e-mail, paging, and caller ID</note></topic><topic id="285" parent="280" x="1643.69" y="970.23" text="CDMA"><note>Code division multiple access
CDMA assigns a unique code to each voice call or data transmission to uniquely identify it from all other transmissions sent over the cellular network. In a CDMA “spread spectrum” network, calls are spread throughout the entire radio-frequency band. CDMA permits every user of the network to simultaneously use every channel in the network. At the same time, a particular cell can simultaneously interact with multiple other cells. These features make CDMA a very powerful technology. It is the main technology for the mobile cellular networks that presently dominate the wireless space.</note></topic><topic id="286" parent="285" x="1646.16" y="1014.55" text="3G"><note>Integration of voice and data
Packet-switched technology, instead of circuit-switched</note></topic><topic id="287" parent="280" x="1701.79" y="946.76" text="OFDMA"><note>Orthogonal frequency division multiple access (OFDMA) is derived from a combination of FDMA and TDMA.
In OFDMA, each of the channels is subdivided into a set of closely spaced orthogonal frequencies with narrow bandwidths (subchannels). Each of the different subchannels can be transmitted and received simultaneously in a multiple input and output (MIMO) manner. The use of orthogonal frequencies and MIMO allows signal processing techniques to reduce the impacts of any interference between different subchannels and to correct for channel impairments, such as noise and selective frequency fading. 4G requires that OFDMA be used.</note></topic><topic id="288" parent="287" x="1702.22" y="1014.10" text="4G"><note>Based on an all-IP packet-switched network
Data exchange at 100 Mbps–1 Gbps</note></topic></topics><relations><relation source="68" target="69"></relation><relation source="69" target="66"></relation><relation source="196" target="197"></relation><relation source="193" target="197"></relation></relations></mindmap></simplemind-mindmaps> | {
"repo_name": "ft44k/CISSP",
"stars": "30",
"repo_language": "None",
"file_name": "Domain 2 Access Control.smmx",
"mime_type": "text/xml"
} |
<?xml version="1.0" encoding="UTF-8"?>
<simplemind-mindmaps doc-version="3" generator="SimpleMindTouch" gen-version="1.8.0" device-type="ipad"><mindmap><meta><guid guid="A5825348E426E07B11A47B0D"></guid><title text="Domain 6\NCryptography"></title><page><visual-area x="-381.74" y="-149.07" width="2080.41" height="1223.46"></visual-area></page><style key="system.spring-levels"></style><auto-numbering style="disabled"></auto-numbering><scrollstate zoom="116" x="650.26" y="604.93"></scrollstate><selection type="node" id="144"></selection><main-centraltheme id="0"></main-centraltheme></meta><topics><topic id="0" parent="-1" x="500.00" y="500.00" text="Domain 6\NCryptography"></topic><topic id="1" parent="0" x="863.52" y="497.57" text="Definitions and Concepts"></topic><topic id="2" parent="1" x="1042.98" y="422.64" text="Cryptology"><note>Is study of the cryptoanalysis and cryptography</note></topic><topic id="3" parent="2" x="1008.97" y="381.93" text="Cryptography"><note>Science of secret writing that enables an entity to store and transmit data in a form that is available only to intended individuals</note></topic><topic id="4" parent="2" x="1114.71" y="380.69" text="Cryptoanalysis"><note>Is the science of studying and breaking the secrecy of encryption processes</note></topic><topic id="5" parent="1" x="1157.99" y="566.47" text="Encryption"></topic><topic id="6" parent="5" x="1262.09" y="596.14" text="Plaintext"></topic><topic id="7" parent="5" x="1253.47" y="547.80" text="Ciphertext"></topic><topic id="8" parent="5" x="1214.50" y="647.70" text="Keyspace"><note>A range of possible values used to construct keys
2bits = 4 possible keys (2^2)
512 bits = 2^512 possible combinations</note></topic><topic id="9" parent="8" x="1290.17" y="649.54" text="Key"><note>Sequence of bits that are used as instructions that govern the acts of cryptographic functions within an algorithm</note></topic><topic id="10" parent="8" x="1248.51" y="691.47" text="Key clustering"><note>Key clustering is an instance in which two different keys generate the same ciphertext from the same plaintext.</note></topic><topic id="11" parent="1" x="990.75" y="585.32" text="Cryptosystem"><note>A system or product that provides encryption and decryption</note></topic><topic id="12" parent="11" x="1014.42" y="646.38" text="SW"></topic><topic id="13" parent="11" x="958.08" y="666.29" text="Protocols"></topic><topic id="14" parent="11" x="1079.08" y="641.29" text="Algorithm"></topic><topic id="15" parent="11" x="924.25" y="630.06" text="Keys"></topic><topic id="16" parent="11" x="1079.71" y="604.84" text="Strength"><note>Or work factor is an estimate of the effort and resources it would take an attacker to penetrate a cryptosystem</note></topic><topic id="17" parent="11" x="882.23" y="588.98" text="Synchronous"><note>Uses keystream to encrypt plaintext one bit at a time.
The keystream values are in synch with the plaintext values.</note></topic><topic id="18" parent="11" x="857.93" y="550.66" text="Asynchronous"><note>Uses previously generated output to encrypt the current plaintext values.</note></topic><topic id="19" parent="1" x="1116.97" y="460.99" text="Kerckhoffs' \Nprinciple"><note>Concept that an algorithm should be known and only the keys should be kept secret</note></topic><topic id="20" parent="1" x="913.97" y="422.99" text="One-time Pad"><note>Encryption scheme which is considered unbreakable, however it is impractical in most situations.
XOR is used, the pad is the value
Requirements:
- pad must be made up of truly random values
- used only once -> at least as long as the msg
- securely distributed to its destination
- secured at senders/receiver sites</note></topic><topic id="21" parent="1" x="1141.97" y="510.99" text="Running and \NConcealment ciphers"><note>The running key cipher could use a key that does not require an electronic algorithm and bit alterations, but cleverly uses components in the physical world around you.
A concealment cipher, also called a null cipher, is a type of steganography method. Steganography is described later in this chapter.
A concealment cipher is a message hidden within a message.</note></topic><topic id="22" parent="1" x="813.98" y="426.64" text="Steganography"><note>Steganography is a method of hiding data in another media type so the very existence of the data is concealed.</note></topic><topic id="23" parent="0" x="945.52" y="225.57" text="Types of ciphers"></topic><topic id="24" parent="23" x="1072.18" y="184.04" text="Substitution cipher"><note>The substitution cipher replaces bits, characters, or blocks of characters with different bits, characters, or blocks.</note></topic><topic id="25" parent="24" x="1188.04" y="173.91" text="Caesar cipher"><note>The algorithm is the alphabet, and the key is the instruction shift up three</note></topic><topic id="26" parent="23" x="1079.14" y="228.01" text="Transposition cipher"><note>The transposition cipher does not replace the original text with different text, but rather moves the original values around. It rearranges the bits, characters, or blocks of characters to hide the original meaning.</note></topic><topic id="27" parent="23" x="940.94" y="168.11" text="Frequency analysis"><note>Frequency analysis
Cryptanalysis process used to identify weaknesses within cryptosystems by locating patterns in resulting ciphertext
Simple substitution and transposition ciphers are vulnerable to attacks that perform frequency analysis. In every language, some words and patterns are used more often than others. For instance, in the English language, the most commonly used letter is E.</note></topic><topic id="28" parent="23" x="925.35" y="273.07" text="KDFs"><note>Key Derivation Functions (KDFs)
Generation of secret keys (subkeys) from an initial value (master key)
Key Derivation Functions (KDFs) are used to generate keys that are made up of random values. Different values can be used independently or together as random key material. The algorithm is created to use specific hash, password, and/or salt values, which will go through a certain number of rounds of mathematical functions dictated by the algorithm.</note></topic><topic id="29" parent="23" x="1044.18" y="284.58" text="Polyalphabetic"><note>A polyalphabetic cipher uses more than one alphabet to defeat frequency analysis.</note></topic><topic id="30" parent="0" x="715.52" y="108.57" text="Methods of Encryption"></topic><topic id="31" parent="30" x="632.57" y="-15.82" text="Symmetric "></topic><topic id="32" parent="31" x="587.98" y="24.81" text="Strengths "><note>- much faster than asymmetric
- hard to break if using large key size</note></topic><topic id="33" parent="31" x="702.01" y="21.39" text="Weaknesses"><note>- Requires a secure mechanism to deliver keys properly.
- Each pair of users needs a unique key, so as the number of individuals increases, so does the number of keys, possibly making key management overwhelming.
- Provides confidentiality but not authenticity or nonrepudiation.</note></topic><topic id="34" parent="31" x="594.09" y="-73.52" text="Algorithms"></topic><topic id="35" parent="34" x="555.63" y="-131.20" text="DES"></topic><topic id="36" parent="34" x="599.95" y="-129.25" text="3DES"></topic><topic id="37" parent="34" x="657.64" y="-127.33" text="Blowfish"></topic><topic id="38" parent="34" x="677.84" y="-88.87" text="IDEA"></topic><topic id="39" parent="34" x="481.68" y="-108.10" text="RC4, RC5, RC6"></topic><topic id="40" parent="34" x="497.52" y="-64.42" text="AES"></topic><topic id="41" parent="30" x="912.17" y="-17.51" text="Asymmetric"></topic><topic id="42" parent="41" x="834.76" y="12.94" text="Strengths"><note>- Better key distribution than symmetric systems.
- Better scalability than symmetric systems
- Can provide authentication and nonrepudiation</note></topic><topic id="43" parent="41" x="955.44" y="22.08" text="Weaknesses"><note>- Works much more slowly than symmetric systems
- Mathematically intensive tasks</note></topic><topic id="44" parent="41" x="909.42" y="-60.33" text="Algorithms"></topic><topic id="45" parent="44" x="831.52" y="-101.72" text="RSA"></topic><topic id="46" parent="44" x="885.61" y="-103.59" text="ECC"></topic><topic id="47" parent="44" x="954.91" y="-103.66" text="Diffie-Hellman"></topic><topic id="48" parent="44" x="1038.69" y="-102.63" text="El Gamal"></topic><topic id="49" parent="44" x="826.05" y="-60.66" text="DSA"></topic><topic id="50" parent="44" x="1038.69" y="-53.20" text="Merkle-Hellman Knapsack"></topic><topic id="51" parent="30" x="872.68" y="105.62" text="Block Ciphers"><note>Block cipher performs mathematical functions on blocks go bits</note></topic><topic id="52" parent="30" x="558.76" y="106.77" text="Stream Cipher"><note>Stream cipher performs mathematical functions on each bit individually.
The sender and the receiver must have the same key to generate the same keystream.
Plaintext bit will be transformed into a different ciphertext bit each time it is encrypted</note></topic><topic id="53" parent="52" x="459.79" y="105.63" text="Keystream\Ngenerators"></topic><topic id="54" parent="30" x="751.81" y="188.37" text="Attributes"><note>For a cipher to be considered strong, it must contain both of these attributes to ensure that reverse-engineering is basically impossible.</note></topic><topic id="55" parent="54" x="802.00" y="224.70" text="Confusion"><note>Confusion is commonly carried out through substitution</note></topic><topic id="56" parent="54" x="727.96" y="236.29" text="Diffusion"><note>Diffusion is carried out by using transposition.</note></topic><topic id="57" parent="30" x="827.64" y="156.96" text="Avalanche \Neffect"><note>Avalanche effect Algorithm design requirement so that slight changes to the input result in drastic changes to the output.</note></topic><topic id="58" parent="30" x="556.49" y="174.35" text="IV"><note>Initialization vectors (IVs)
are random values that are used with algorithms to ensure patterns are not created during the encryption process. They are used with keys and do not need to be encrypted when being sent to the destination. If IVs are not used, then two identical plaintext values that are encrypted with the same key will create the same ciphertext.</note></topic><topic id="59" parent="30" x="636.86" y="191.18" text="Hybrid\Nencryption\Nmethods"></topic><topic id="60" parent="0" x="346.88" y="229.81" text="Types of\NSymmetric\NSystems"></topic><topic id="61" parent="60" x="305.44" y="156.69" text="DES"><note>Data Encryption Standard
NSA modified IBM's 128-bit algorithm named Lucifer to use key size only 64 bits(effective key length 56 bits + 8 parity bits )
They named it DEA. So DES is standard and DEA is algorithm. (But DEA is referred as DES)
DES is symmetric block encryption algorithm
- divides a message into 64-bit blocks and employs S-box-type functions on them.
Blocks are put through 16 rounds of transposition and substitution functions.
The order and type of functions depend on the value of the key.</note></topic><topic id="62" parent="61" x="219.06" y="101.06" text="ECB"><note>Electronic Code Book
The fastest, operations can be run in parallel
If error occur, only one block is affected
Only usable for short messages (pin)
A key is basically instructions for the use of a code book that dictates how a block of text will be encrypted.
Each block will be encrypted with the same key.</note></topic><topic id="63" parent="62" x="215.20" y="58.60" text="Pin"></topic><topic id="64" parent="61" x="264.86" y="101.12" text="CBC"><note>Cipher Block Chaining
ciphertext from previous block is used to XOR plaintext of the next block before it is encrypted.
We use IV to encrypt the first block - first 64 bits of plaintext are XORed with IV.
This chaining creates dependency on all previous blocks not just one.
This can be used for example for email encryption</note></topic><topic id="65" parent="64" x="262.90" y="61.12" text="Doc"></topic><topic id="66" parent="61" x="310.91" y="101.69" text="CFB"><note>Cipher Feedback Mode
Combination of block and stream cipher
Can be used to encrypt any size of block, even blocks of just one bit (usually 8bits)
IV + key = keystream1
Plaintext1 >> keystream1>> ciphertext1
Ciphertext1 + key = keystream2
Plaintext2 >> keystream2 >> ciphertext2
!!! It is important to use a new unique IV value to encrypt each new stream of data</note></topic><topic id="67" parent="66" x="312.75" y="58.55" text="Stream"></topic><topic id="68" parent="61" x="354.12" y="103.85" text="OFB"><note>Output Feedback Mode
Smaller chance to extend error throughout the full encryption process.
Suitable for video, voice
IV + key = keystream1
Plaintext1 XOR keystream1 => ciphertext1
Keystream1 + key = keystream2
Plaintext2 XOR keystream2 => ciphertext2</note></topic><topic id="69" parent="68" x="381.82" y="59.53" text="Voice,video"></topic><topic id="70" parent="61" x="371.87" y="143.10" text="CTR"><note>Counter mode
No chaining = parallel processing = performance
Using counter + key => keystream
So each block is XORed with unique keystream
Encryption of
ATM cells for virtual circuits
IPSec
Integrated in 802.11i</note></topic><topic id="71" parent="60" x="241.58" y="190.52" text="3DES"><note>Uses 48 rounds => more resistance to differential cryptoanalysis, but also heavy performance hit</note></topic><topic id="72" parent="71" x="172.40" y="164.72" text="DES-EEE3"><note>3 different keys for encryption and the data are encrypted,encrypted,encrypted</note></topic><topic id="73" parent="71" x="172.05" y="200.04" text="DES-EDE3"><note>3 different keys for encryption
Data are encrypted, decrypted, encrypted</note></topic><topic id="74" parent="71" x="208.50" y="234.61" text="DES-EEE2"><note>2 different keys
1. And 3. encryption with the same key</note></topic><topic id="75" parent="71" x="263.64" y="271.06" text="DES-EDE2"><note>2 keys
1. and 3. Encryption use the same key</note></topic><topic id="76" parent="60" x="426.07" y="191.72" text="AES"><note>Advanced Encryption Standard
Rijndael algorithm:
Supports 128, 192,256 bits block size
Number of rounds depends on the block size
128=>10 rounds
192=>12 rounds
256=>14 rounds
Low memory requirements
Defend against timing attacks</note></topic><topic id="77" parent="60" x="458.78" y="255.27" text="Other algorithms"></topic><topic id="78" parent="77" x="544.32" y="259.42" text="Block"></topic><topic id="79" parent="78" x="600.85" y="260.31" text="Blowfish"><note>Block cipher
Block size: 64 bits
Key size: 32 - 448 bits
Data blocks go through 16 rounds
Bruce Schneier created this as public domain</note></topic><topic id="80" parent="78" x="529.56" y="222.09" text="IDEA"><note>Block cipher
Block size: 64 bits
Key size: 128 bits
The 64 bit block is divided into 16 smaller blocks and each has 8 rounds of mathematical functions performed on it.
Offers similar modes to DES, but it is considered harder to break (bigger key)
IDEA is used in PGP</note></topic><topic id="81" parent="78" x="519.65" y="300.65" text="RC5"><note>Block size: 32, 64, 128 bits
Key size: up to 2048 bits
Number of rounds: up to 255</note></topic><topic id="82" parent="78" x="569.10" y="310.10" text="RC6"><note>Same attributes as RC5, but optimized for speed</note></topic><topic id="83" parent="77" x="458.66" y="299.53" text="Stream"></topic><topic id="84" parent="83" x="434.57" y="337.42" text="RC4"><note>Stream cipher
Used in SSL protocol
Key size: variable
Simple fast efficient algorithm, but with low diffusion rate => modification attack
802.11i therefore moved from RC4 to AES</note></topic><topic id="85" parent="0" x="-58.40" y="222.05" text="Types of\NAsymmetric\NSystems"></topic><topic id="86" parent="85" x="-34.86" y="148.49" text="Diffie-Hellman"><note>Enables two systems to generate a symmetric key.
Private_1 + Public_2 => symmetric key
Private_2 + Public_1 => the same symmetric key
Vulnerable to a man-in-the-middle attack, countermeasure is to have authentication take place before accepting the public key</note></topic><topic id="87" parent="85" x="-156.61" y="228.12" text="RSA"><note>Can be used for
- digital signatures
- key exchange
- encryption
Based on the difficulty of factoring large numbers</note></topic><topic id="88" parent="85" x="-178.15" y="162.45" text="El Gamal"><note>Based on calculating discrete logarithms in a finite field. It is actually extension of the Diffie- Hellman algorithm.
It's main drawback is performance</note></topic><topic id="89" parent="85" x="-131.24" y="126.12" text="ECC"><note>Elliptic Curve Cryptosystem
- digital signatures
- secure key distribution
- encryption
It needs less resources than RSA and other algorithms, so it is used in eg cell phones
It provides the same level of protection with a smaller key</note></topic><topic id="90" parent="85" x="-66.37" y="285.40" text="Knapsack"><note>Based on knapsack problem:
If you have several different items, each having its own weight, is it possible to add these items to a knapsack so the knapsack has a specific weight?
This algorithm was discovered insecure and is not used in cryptosystems.</note></topic><topic id="91" parent="85" x="48.59" y="291.00" text="Zero Knowledge Proof"><note>One entity can prove something to be true without providing a secret value.
If I encrypt msg with my private key, I provide a proof that I have my private key.
So only owner of the private key can prove possession of the key.</note></topic><topic id="92" parent="0" x="-129.86" y="407.34" text="Message Integrity"><note>Hashing algorithms provide data integrity only.</note></topic><topic id="93" parent="92" x="-238.58" y="391.35" text="MAC"><note>Message Authentication Code
- authentication scheme derived by applying a secret key to a message
MAC is sometimes called Message integrity code MIC or Modification detection code MDC</note></topic><topic id="94" parent="93" x="-311.56" y="380.61" text="HMAC"><note>Hash MAC
- sender concatenates a symmetric key with the message
- result is put through hashing algorithm
- MAC is generated and appended to the msg
- receiver uses his copy of the secret key together with the message to generate MAC
If both MAC are the same, message was not modified</note></topic><topic id="95" parent="93" x="-302.50" y="341.72" text="CBC-MAC"><note>Message is encrypted with symmetric block cipher in CBC mode, and the output of the final block of ciphertext is used as MAC</note></topic><topic id="96" parent="93" x="-306.01" y="418.54" text="CMAC"><note>Cipher-Based Message Authentication Code
- provides the same level of data origin authentication as CBC-MAC
- AES or 3DES
Works the same way as CBC, but is based on more complex logic and mathematical functions.</note></topic><topic id="97" parent="92" x="-179.13" y="351.91" text="MD2"><note>one-way hash function designed by Ron Rivest that creates 128-bit message digest value.
It is not weaker than other MD, it is just slower</note></topic><topic id="98" parent="92" x="-131.39" y="349.95" text="MD4"><note>One-way hash function designed by Ron Rivest. It also produces 128-bit message digest value</note></topic><topic id="99" parent="92" x="-88.06" y="349.39" text="MD5"><note>Newer version of MD4, produces 128-bit hash, but is more complex = harder to break
Latest research has shown MD5 to be subject of collision attack, and is therefore no longer suitable for applications like SSL certificates and digital signatures.</note></topic><topic id="100" parent="92" x="-181.39" y="472.73" text="SHA"><note>Was designed to be used with Digital Signature Standard DSS.
Produces 160-bit hash value.
SHA was improved upon and renamed SHA-1.
Newer versions of this algorithm have been developed and released: SHA-256,384,512</note></topic><topic id="101" parent="92" x="-125.74" y="468.55" text="HAVAL"><note>Variable-length one-way hash function, it is a modification of MD5.
Block size re twice the size of those in MD5 => 1024 bits
HAVAL can produce hashes from 128 to 256 bits in length</note></topic><topic id="102" parent="92" x="-74.63" y="451.88" text="Tiger"><note>Ross Anderson and Eli Biham developed this algorithm ( it is not based on MD4)
It was design to carry out hashing functionalities on 64-bit systems and to be faster as MD5
Resulting hash is 192 bits in size</note></topic><topic id="103" parent="92" x="-25.74" y="385.22" text="RIPEMD"><note>RACE Integrity Primitives Evaluation - RIPE
It was developed to replace MD4</note></topic><topic id="104" parent="92" x="-240.18" y="455.77" text="Attacks"><note>If the algorithm does produce the same value for two distinctly different messages, this is called a collision. An attacker can attempt to force a collision, which is referred to as a birthday attack.</note></topic><topic id="105" parent="104" x="-310.70" y="497.64" text="Birthday attack"><note>Brute force
The output of a hashing algorithm is n, and to find a message through a brute force attack that results in a specific hash value would require hashing 2^n random messages. To take this one step further, finding two messages that hash to the same value would require review of only 2^n/2 messages.
This is based on The birthday paradox.
There is a higher probability of finding two people who share a birthday than of finding another person who shares your birthday.
if a hashing algorithm generates a message digest of 60 bits, there is a high likelihood that an adversary can find a collision using only 2^30 inputs.</note></topic><topic id="106" parent="92" x="16.62" y="445.45" text="Digital Signature"><note>A digital signature is a hash value that has been encrypted with the sender’s private key.
- A message can be encrypted, which provides confidentiality.
- A message can be hashed, which provides integrity.
- A message can be digitally signed, which provides authentication, nonrepudiation, and integrity.
- A message can be encrypted and digitally signed, which provides confidentiality, authentication, nonrepudiation, and integrity.</note></topic><topic id="107" parent="0" x="-5.40" y="552.47" text="Public Key Infrastructure"><note>PKI is an ISO authentication framework that uses public key cryptography and the X.509 standard.
It is a hybrid system of symmetric and asymmetric key algorithms and methods.
A PKI may be made up of the following entities and functions:
- Certification authority
- Registration authority
- Certificate repository
- Certificate revocation system
- Key backup and recovery system
- Automatic key update
- Management of key histories
- Timestamping
- Client-side software</note></topic><topic id="108" parent="107" x="-189.03" y="562.98" text="Certificate Authority"><note>CA - certificate authority - trusted third party, issuer of digital certificates
The CA is responsible for creating and handing out certificates, maintaining them, and revoking them if necessary.</note></topic><topic id="109" parent="108" x="-323.74" y="567.05" text="Cross certification"><note>is the process undertaken by CAs to establish a trust relationship in which they rely upon each other’s digital certificates and public keys as if they had issued them themselves. When this is set up, a CA for one company can validate digital certificates from the other company and vice versa.</note></topic><topic id="110" parent="108" x="-249.47" y="610.67" text="CRL"><note>certificate revocation list (CRL) is a list of every certificate that has been revoked. This list is maintained and updated periodically.
A certificate may be revoked because the key holder’s private key was compromised or because the CA discovered the certificate was issued to the wrong person.</note></topic><topic id="111" parent="108" x="-196.05" y="613.29" text="OCSP"><note>Online Certificate Status Protocol (OCSP)
carries out real-time validation of a certificate and reports back to the user whether the certificate is valid, invalid, or unknown.
OCSP checks the CRL that is maintained by the CA. So the CRL is still being used, but now we have a protocol developed specifically to check the CRL during a certificate validation process.</note></topic><topic id="112" parent="107" x="-71.34" y="600.25" text="Registration Authority"><note>RA - registration authority - verifies identity of the requestor and passes the cert request off to CA</note></topic><topic id="113" parent="107" x="39.95" y="598.97" text="Certificate"><note>The standard for how the CA creates the certificate is X.509
A certificate is the mechanism used to associate a public key with a collection of components in a manner that is sufficient to uniquely identify the claimed owner.
- serial number
- version number
- identity information
- algorithm information
- lifetime dates
- signature of the issuer</note></topic><topic id="114" parent="0" x="100.73" y="646.81" text="Key Management"><note>Key management is one of the most challenging pieces of cryptography. It pertains to creating, maintaining, distributing, and destroying cryptographic keys.</note></topic><topic id="115" parent="114" x="58.98" y="709.79" text="Kerberos"><note>When using the Kerberos protocol, a Key Distribution Center (KDC) is used to store, distribute, and maintain cryptographic session and secret keys.
This method provides an automated method of key distribution. The computer that wants to access a service on another computer requests access via the KDC. The KDC then generates a session key to be used between the requesting computer and the computer providing the requested resource or service.
The automation of this process reduces the possible errors that can happen through a manual process, but if the ticket granting service (TGS) portion of the KDC gets compromised in any way, then all the computers and their services are affected and possibly compromised.</note></topic><topic id="116" parent="114" x="-24.89" y="694.10" text="Principles"><note>The key should not be stored in cleartext outside of the cryptographic device.
The key length should be long enough to provide the necessary level of protection.
Keys should be stored and transmitted by secure means.
Keys should be extremely random, and the algorithm should use the full spectrum of the keyspace.
The key’s lifetime should correspond with the sensitivity of the data it is protecting. (Less secure data may allow for a longer key lifetime, whereas more sensitive data might require a shorter key lifetime.)
The more the key is used, the shorter its lifetime should be.
Keys should be backed up or escrowed in case of emergencies.
Keys should be properly destroyed when their lifetime comes to an end.</note></topic><topic id="117" parent="114" x="133.06" y="689.40" text="Recovery"><note>Key escrow
is a process or entity that can recover lost or corrupted cryptographic keys; thus, it is a common component of key recovery operations.
Multiparty key recovery
key recovery processes where two or more entities are required to reconstruct a key. Multiparty key recovery implements dual control, meaning that two or more people have to be involved with a critical task.</note></topic><topic id="118" parent="0" x="258.59" y="720.11" text="Trusted Platform Module"><note>The Trusted Platform Module (TPM) is a microchip installed on the motherboard of modern computers and is dedicated to carrying out security functions that involve the storage and processing of symmetric and asymmetric keys, hashes, and digital certificates.
It can be used for platform integrity, disk encryption, password protection, and remote attestation.
Usage:
Binding
- hdd encryption, key is stored on the chip
Sealing
- TPM generates hash values based on the system configuration. A system can be used only when TPM verifies the integrity of the system configuration.
TPM's internal memory is divided into two different segments.</note></topic><topic id="119" parent="118" x="152.83" y="772.25" text="Persistent memory"></topic><topic id="120" parent="119" x="76.47" y="809.89" text="EK"><note>Endorsement key
The EK is a public/private key pair that is installed in the TPM at the time of manufacture and cannot be modified. The private key is always present inside the TPM, while the public key is used to verify the authenticity of the TPM itself. The EK, installed in TPM, is unique to that TPM and its platform.</note></topic><topic id="121" parent="119" x="147.38" y="813.39" text="SRK"><note>Storage Root Key
The SRK is the master wrapping key used to secure the keys stored in the TPM.</note></topic><topic id="122" parent="118" x="270.24" y="773.85" text="Versatile memory"></topic><topic id="123" parent="122" x="223.32" y="817.98" text="AIK"><note>Attestation Identity Key
The AIK is used for the attestation of the TPM chip itself to service providers. The AIK is linked to the TPM’s identity at the time of development, which in turn is linked to the TPM’s Endorsement Key. Therefore, the AIK ensures the integrity of the EK.</note></topic><topic id="124" parent="122" x="270.75" y="819.45" text="PCR"><note>Platform Configuration Register Hashes
The PCR is used to store cryptographic hashes of data used for TPM’s “sealing” functionality.</note></topic><topic id="125" parent="122" x="331.20" y="822.31" text="Storage"><note>The storage keys are used to encrypt the storage media of the computer system.</note></topic><topic id="126" parent="0" x="451.28" y="752.33" text="Link Encryption vs\NEnd-to-End Encryption"></topic><topic id="127" parent="126" x="437.12" y="825.66" text="Link"><note>Link encryption, which is sometimes called online encryption, is usually provided by service providers and is incorporated into network protocols.
All of the information is encrypted, and the packets must be decrypted at each hop so the router, or other intermediate device, knows where to send the packet next.
The router must decrypt the header portion of the packet, read the routing and address information within the header, and then re-encrypt it and send it on its way.
The only traffic not encrypted in this technology is the data link control messaging information, which includes instructions and parameters that the different link devices use to synchronize communication methods.
Link encryption provides protection against packet sniffers and eavesdroppers.</note></topic><topic id="128" parent="127" x="355.24" y="885.78" text="Traffic-flow security"><note>Link encryption occurs at the data link and physical layers.
Hardware encryption devices interface with the physical layer and encrypt all data that passes through them. Because no part of the data is available to an attacker, the attacker cannot learn basic information about how data flows through the environment. This is referred to as traffic-flow security.</note></topic><topic id="129" parent="127" x="443.94" y="888.19" text="Pros"><note>All data are encrypted, including headers, addresses, and routing information.
Users do not need to do anything to initiate it. It works at a lower layer in the OSI model.</note></topic><topic id="130" parent="127" x="489.78" y="888.59" text="Cons"><note>Key distribution and management are more complex because each hop device must receive a key, and when the keys change, each must be updated.
Packets are decrypted at each hop; thus, more points of vulnerability exist.</note></topic><topic id="131" parent="126" x="502.32" y="825.53" text="End-to-end"><note>In end-to-end encryption, the headers, addresses, routing, and trailer information are not encrypted, enabling attackers to learn more about a captured packet and where it is headed.
With end-to-end encryption, the packets do not need to be decrypted and then encrypted again at each hop because the headers and trailers are not encrypted.
It is called “end-to-end encryption” because the message stays encrypted from one end of its journey to the other.
Link encryption has to decrypt the packets at every device between the two ends.</note></topic><topic id="132" parent="131" x="569.88" y="865.86" text="Pros"><note>It provides more flexibility to the user in choosing what gets encrypted and how.
Higher granularity of functionality is available because each application or user can choose specific configurations.
Each hop device on the network does not need to have a key to decrypt each packet.</note></topic><topic id="133" parent="131" x="573.65" y="828.93" text="Cons"><note>Disadvantages of end-to-end encryption include the following:
Headers, addresses, and routing information are not encrypted, and therefore not protected.</note></topic><topic id="134" parent="0" x="707.87" y="990.23" text="E-mail Standards"></topic><topic id="135" parent="134" x="621.77" y="1046.67" text="MIME"><note>Multipurpose Internet Mail Extension (MIME) is a technical specification indicating how multimedia data and e-mail binary attachments are to be transferred.
MIME is a specification that dictates how certain file types should be transmitted and handled. This specification has several types and subtypes, enables different computers to exchange data in varying formats, and provides a standardized way of presenting the data.</note></topic><topic id="136" parent="134" x="708.46" y="1051.84" text="SMIME"><note>extends the MIME standard by allowing for the encryption of e-mail and attachments.
The encryption and hashing algorithms can be specified by the user of the mail package, instead of having it dictated to them.
S/MIME follows the Public Key Cryptography Standards (PKCS).
S/MIME provides confidentiality through encryption algorithms, integrity through hashing algorithms, authentication through the use of X.509 public key certificates, and nonrepudiation through cryptographically signed message digests.</note></topic><topic id="137" parent="134" x="783.38" y="1031.18" text="PGP"><note>Pretty Good Privacy (PGP) was designed by Phil Zimmerman.
PGP is considered a cryptosystem because it has all the necessary components: symmetric key algorithms, asymmetric key algorithms, message digest algorithms, keys, protocols, and the necessary software components.</note></topic><topic id="138" parent="137" x="843.86" y="1056.52" text="Key ring"><note>key ring is a collection of public keys he has received from other users.
Each key in that ring has a parameter that indicates the level of trust assigned to that user and the validity of that particular key.</note></topic><topic id="139" parent="137" x="861.88" y="995.35" text="Web of trust"><note>There is no CA
System relies on a “web of trust” in its key management approach. Each user generates and distributes his or her public key, and users sign each other’s public keys, which creates a community of users who trust each other.</note></topic><topic id="140" parent="134" x="837.43" y="934.70" text="Quantum cryptography"><note>Use of quantum mechanical functions to provide strong cryptographic key exchange</note></topic><topic id="141" parent="0" x="1009.65" y="846.77" text="Internet Security"></topic><topic id="142" parent="141" x="1076.79" y="892.45" text="HTTP"><note>HTTP is a stateless protocol, which means the client and web server make and break a connection for each operation.
The web server never “remembers” the users that ask for different web pages, because it would have to commit a lot of resources to the effort.</note></topic><topic id="143" parent="141" x="1017.20" y="895.03" text="HTTPS"><note>HTTP Secure (HTTPS) is HTTP running over SSL.</note></topic><topic id="144" parent="143" x="1027.39" y="960.17" text="SSL"><note>Proprietary protocol developed by Netscape
Secure Sockets Layer (SSL) uses public key encryption and provides data encryption, server authentication, message integrity, and optional client authentication.
The SSL protocol works at the transport layer
SSL requires a PKI environment</note></topic><topic id="145" parent="143" x="1075.36" y="957.92" text="TLS"><note>open-community and standardized version of SSL is Transport Layer Security (TLS). The differences between SSL 3.0 and TLS are slight, but TLS is more extensible and is backward compatible with SSL.</note></topic><topic id="146" parent="141" x="1114.13" y="851.97" text="S-HTTP"><note>Secured HTTP
S-HTTP is used if an individual message needs to be encrypted, but if all information that passes between two computers must be encrypted, then HTTPS is used instead</note></topic><topic id="147" parent="141" x="1054.63" y="806.14" text="SET"><note>SET is a cryptographic protocol and infrastructure developed to send encrypted credit card numbers over the Internet.
To use SET, a user must enter credit card number into electronic wallet software. This information is stored on the user’s hard drive or on a smart card. The software then creates a public key and a private key that are used specifically for encrypting financial information before it is sent.
The following entities would be involved with a SET transaction:
- Issuer (cardholder’s bank) The financial institution that provides a credit card to the individual.
- Cardholder The individual authorized to use a credit card.
- Merchant The entity providing goods.
- Acquirer (merchant’s bank) The financial institution that processes payment cards.
- Payment gateway This processes the merchant payment. It may be an acquirer.</note></topic><topic id="148" parent="141" x="983.89" y="801.83" text="Cookies"><note>Cookies
Data files used by web browsers and servers to keep browser state information and browsing preferences.
Stored on user hdd or in memory</note></topic><topic id="149" parent="141" x="946.55" y="884.36" text="SSH"><note>Secure Shell (SSH)
Network protocol that allows for a secure connection to a remote system. Developed to replace Telnet and other insecure remote shell methods.
The two computers go through a handshaking process and exchange (via Diffie-Hellman) a session key that will be used during the session to encrypt and protect the data sent.
SSH should be used instead of Telnet, FTP, rlogin, rexec, or rsh.</note></topic><topic id="150" parent="141" x="882.09" y="854.84" text="IPSec"><note>IPSec Protocol suite used to protect IP traffic through encryption and authentication. De facto standard VPN protocol.</note></topic><topic id="151" parent="150" x="877.99" y="891.57" text="AH"><note>if a company just needs to make sure it knows the source of the sender and must be assured of the integrity of the packets, it would choose to use AH.
The AH protocol calculates ICV over the data payload, transport, and network headers. If the packet then goes through a NAT device, the NAT device changes the IP address of the packet. This means network header that was included to calculate the ICV value has now changed, and the receiver will generate an ICV value that is different from the one sent with the packet, which means the packet will be discarded automatically.</note></topic><topic id="152" parent="150" x="827.76" y="891.54" text="ESP"><note>The ESP protocol can provide authentication, integrity, and confidentiality.
The ESP protocol does not include the network header portion when calculating its ICV value. When the NAT device changes the IP address, it will not affect the receiver’s ICV value because it does not include the network header when calculating the ICV.
So when we want to go through a NAT, ESP is the right choice</note></topic><topic id="153" parent="150" x="779.77" y="830.74" text="IKE"><note>Because IPSec is a framework, it does not dictate which hashing and encryption algorithms are to be used or how keys are to be exchanged between devices.
Key management can be handled manually or automated by a key management protocol.
The de facto standard for IPSec is to use Internet Key Exchange (IKE), which is a combination of the ISAKMP and OAKLEY protocols.</note></topic><topic id="154" parent="153" x="727.27" y="825.78" text="ISAKMP"><note>The Internet Security Association and Key Management Protocol (ISAKMP) is a key exchange architecture that is independent of the type of keying mechanisms used.
Basically, ISAKMP provides the framework of what can be negotiated to set up an IPSec connection (algorithms, protocols, modes, keys).</note></topic><topic id="155" parent="153" x="725.44" y="786.23" text="OAKLEY"><note>The OAKLEY protocol is the one that carries out the negotiation process.
You can think of ISAKMP as providing the playing field (the infrastructure) and OAKLEY as the guy running up and down the playing field (carrying out the steps of the negotiation).</note></topic><topic id="156" parent="150" x="782.17" y="866.14" text="SKIP"><note>Simple Key Management Protocol for IP (SKIP) is another key exchange protocol that provides basically the same functionality as IKE. It is important to know that all of these protocols work at the network layer.</note></topic><topic id="157" parent="0" x="1232.68" y="774.98" text="Attacks"></topic><topic id="158" parent="157" x="1380.31" y="884.48" text="Active"></topic><topic id="159" parent="158" x="1473.14" y="835.97" text="Known-Plaintext"><note>In known-plaintext attacks, the attacker has the plaintext and corresponding ciphertext of one or more messages.
The goal is to discover the key used to encrypt the messages so other messages can be deciphered and read.</note></topic><topic id="160" parent="159" x="1634.67" y="834.74" text="Linear Cryptanalysis"><note>Linear cryptanalysis is another type of attack that carries out functions to identify the highest probability of a specific key employed during the encryption process using a block algorithm.
The attacker carries out a known-plaintext attack on several different messages encrypted with the same key. The more messages the attacker can use and put through this type of attack, the higher the confidence level in the probability of a specific key value.
The attacker evaluates the input and output values for each S-box. He evaluates the probability of input values ending up in a specific combination.
Identifying specific output combinations allows him to assign probability values to different keys until one shows a continual pattern of having the highest probability.</note></topic><topic id="161" parent="158" x="1476.15" y="883.80" text="Chosen-Plaintext"><note>In chosen-plaintext attacks, the attacker has the plaintext and ciphertext, but can choose the plaintext that gets encrypted to see the corresponding ciphertext.
This gives more power and possibly a deeper understanding of the way the encryption process works so the attacker can gather more information about the key being used.
Once the key is discovered, other messages encrypted with that key can be decrypted.</note></topic><topic id="162" parent="161" x="1618.36" y="877.46" text="Differential Cryptanalysis"><note>The goal is get the key that was used for encryption purposes.
This attack looks at ciphertext pairs generated by encryption of plaintext pairs with specific differences and analyzes the effect and result of those differences.
One such attack was invented in 1990 as an attack against DES, and it turned out to be an effective and successful attack against DES and other block algorithms.
The attacker takes two messages of plaintext and follows the changes that take place to the blocks as they go through the different S-boxes. (Each message is being encrypted with the same key.) The differences identified in the resulting ciphertext values are used to map probability values to different possible key values. The attacker continues this process with several more sets of messages and reviews the common key probability values. One key value will continue to show itself as the most probable key used in the encryption processes.
Since the attacker chooses the different plaintext messages for this attack, it is considered to be a type of chosen-plaintext attack.</note></topic><topic id="163" parent="158" x="1481.89" y="1028.58" text="Chosen-Ciphertext "><note>In chosen-ciphertext attacks, the attacker can choose the ciphertext to be decrypted and has access to the resulting decrypted plaintext.
Again, the goal is to figure out the key. This is a harder attack to carry out compared to the previously mentioned attacks, and the attacker may need to have control of the system that contains the cryptosystem.</note></topic><topic id="164" parent="158" x="1386.16" y="1031.51" text="Replay"><note>Replay Attacks
An attacker captures some type of data and resubmits it with the hopes of fooling the receiving device into thinking it is legitimate information(authentication information).
Timestamps and sequence numbers are two countermeasures to replay attacks.</note></topic><topic id="165" parent="158" x="1318.41" y="1013.06" text="Algebraic"><note>Algebraic attacks analyze the vulnerabilities in the mathematics used within the algorithm and exploit the intrinsic algebraic structure.
For instance, attacks on the “textbook” version of the RSA cryptosystem exploit properties of the algorithm, such as the fact that the encryption of a raw “0” message is “0.”</note></topic><topic id="166" parent="158" x="1273.05" y="969.47" text="Analytic"><note>Analytic attacks identify algorithm structural weaknesses or flaws, as opposed to brute force attacks, which simply exhaust all possibilities without respect to the specific properties of the algorithm.
Examples include the Double DES attack and RSA factoring attack.</note></topic><topic id="167" parent="158" x="1257.50" y="934.47" text="Statistical"><note>Statistical attacks identify statistical weaknesses in algorithm design for exploitation—for example, if statistical patterns are identified, as in the number of zeros compared to the number of ones.
For instance, a random number generator (RNG) may be biased. If keys are taken directly from the output of the RNG, then the distribution of keys would also be biased. The statistical knowledge about the bias could be used to reduce the search time for the keys.</note></topic><topic id="168" parent="158" x="1231.40" y="887.11" text="Social Engineering"></topic><topic id="169" parent="158" x="1223.07" y="846.55" text="Meet-in-the-Middle"><note>Meet-in-the-middle attack
Cryptanalysis attack that tries to uncover a mathematical problem from two different ends.
The attack works by encrypting from one end and decrypting from the other end, thus meeting in the middle.</note></topic><topic id="170" parent="157" x="1323.12" y="733.90" text="Passive"><note>Passive attacks
the attacker is not affecting the protocol, algorithm, key, message, or any parts of the encryption system.
Passive attacks are hard to detect, so in most cases methods are put in place to try to prevent them rather than to detect and stop them.</note></topic><topic id="171" parent="170" x="1403.17" y="740.91" text="Sniffing"></topic><topic id="172" parent="170" x="1416.90" y="706.36" text="Side-Channel "><note>The idea is that instead of attacking a device head on, just watch how it performs to figure out how it works.
An attacker could measure power consumption, radiation emissions, and the time it takes for certain types of data processing.</note></topic></topics><relations><relation source="6" target="7"></relation></relations></mindmap></simplemind-mindmaps> | {
"repo_name": "ft44k/CISSP",
"stars": "30",
"repo_language": "None",
"file_name": "Domain 2 Access Control.smmx",
"mime_type": "text/xml"
} |
<?xml version="1.0" encoding="UTF-8"?>
<simplemind-mindmaps doc-version="3" generator="SimpleMindTouch" gen-version="1.8.0" device-type="ipad"><mindmap><meta><guid guid="853A67745D4F862E580D0E51"></guid><title text="Domain 4\NPhysical and Environmental Security"></title><page><visual-area x="-648.66" y="0.00" width="1717.84" height="1033.32"></visual-area></page><style key="system.spring-levels"></style><auto-numbering style="disabled"></auto-numbering><scrollstate zoom="85" x="420.34" y="-103.00"></scrollstate><selection type="node" id="5"></selection><main-centraltheme id="0"></main-centraltheme></meta><topics><topic id="0" parent="-1" x="500.00" y="500.00" text="Domain 4\NPhysical and Environmental Security"></topic><topic id="1" parent="0" x="749.56" y="501.37" text="The Planning Process"></topic><topic id="2" parent="1" x="886.54" y="487.08" text="CPTED"><note>Crime prevention through environmental design
Combines the physical environment and sociology issues that surround it to reduce crime rates and the fear of crime
3 strategies
1. Natural access control
2. Natural surveillance
3. Natural territorial reinforcement</note></topic><topic id="3" parent="1" x="917.39" y="533.54" text="Designing a Physical\Nsecurity Program"><note>Team needs to investigate
.construction materials of walls and ceilings
.power distribution systems
.communication paths and types
.surrounding hazardous materials
.exterior components</note></topic><topic id="4" parent="3" x="1025.42" y="554.24" text="Doors"><note>Vault
Personnel
Industrial
Vehicle access doors
Bullet-resistant doors</note></topic><topic id="5" parent="3" x="1035.18" y="514.03" text="Windows"><note>Standard
Tempered
Acrylic
Wired
Laminated
Solar window film
Security film</note></topic><topic id="6" parent="3" x="1028.20" y="596.19" text="Lightning"><note>Continuous - Parkin lot
Controlled - erect in a way that does not blind neighbors
Standby - programmed to turn on
Responsive - ids detection</note></topic><topic id="7" parent="0" x="611.56" y="381.37" text="Protecting Assets"></topic><topic id="8" parent="7" x="662.82" y="326.87" text="Safes"><note>Wall safe
Floor safe
Chest - standalone
Depositories - safe with slots
Vaults - walk-in access</note></topic><topic id="9" parent="0" x="384.56" y="383.37" text="Internal Support Systems"><note>Electric Power</note></topic><topic id="10" parent="9" x="229.14" y="306.40" text="Electric Power"></topic><topic id="11" parent="10" x="215.53" y="189.07" text="Online UPS\NStandby UPS"><note>Online UPS have the normal primary power passing through them day in and day out. They are much faster than standby.
Standby UPS stay inactive until power line fails.</note></topic><topic id="12" parent="10" x="333.30" y="183.40" text="Backup power supply"></topic><topic id="13" parent="10" x="100.30" y="191.40" text="Electric power issues"><note>EMI electromagnetic interference ( motors)
RFI radio frequency interference (fluorescent light)
May cause disturbance to the flow of electric power ( power noise)</note></topic><topic id="14" parent="13" x="-10.23" y="137.35" text="Power fluctuations"><note>1. Power excess
- spike : momentary high voltage
- surge : prolonged high voltage
2. Power loss
- fault : momentary power outage
- blackout : prolonged, complete loss of electric power
3. Power degradation
- sag/dip - momentary low-voltage condition
- brownout - prolonged power supply that is below normal voltage
- in-rush current : initial surge of current required to start a load</note></topic><topic id="15" parent="9" x="367.31" y="317.64" text="Environmental Issues"></topic><topic id="16" parent="15" x="373.43" y="266.34" text="Static electricity"><note>Anti static flooring
Proper humidity
Proper grounding
Wear Anti static bands when working inside computer systems</note></topic><topic id="17" parent="9" x="154.59" y="350.65" text="Ventilation"></topic><topic id="18" parent="17" x="67.76" y="338.30" text="HVAC"><note>System should maintain the appropriate temperature and humidity levels and provide closed-loop recirculating air-conditioning and positive pressurization and ventilation
HVAC system should be off before activating of a fire suppressant</note></topic><topic id="19" parent="9" x="486.00" y="323.27" text="Fire prevention\NDetection\NSuppression"><note>Training employees how to react
Supplying the right equipment
Storing combustible elements in a proper manner</note></topic><topic id="20" parent="19" x="501.93" y="249.51" text="Detection"><note>1. Smoke activated
2. Heat activated</note></topic><topic id="21" parent="19" x="585.84" y="251.42" text="Suppression"></topic><topic id="22" parent="21" x="662.94" y="189.73" text="Types of fire"><note>A - common combustibles - water,foam
B - Liquid - Gas, CO2, foam, dry powders
C - electrical - Gas, CO2, dry powders
D - combustible metals - dry powder
Halon is banned since 1987 by Montreal protocol. The most effective replacement is
FM-200 which does not damage ozone</note></topic><topic id="23" parent="21" x="702.49" y="236.40" text="Water sprinklers"><note>1. Wet pipe
Always contain water in the pipes
2. Dry pipe
Water is not held in the pipes, but it is stored in a tank. Pipes are under pressure not allowing the water valve to open
3. Preaction
Similar to dry pipe + thermal-fusible on the sprinkler head has to melt before the water is released
4. Deluge
Wide open sprinkler heads allow a large volume of water to be released, these are not used in data processing environments</note></topic><topic id="24" parent="21" x="575.77" y="151.21" text="Portable fire extinguisher"><note>Should be located within 50 feet of electrical equipment and should be inspected quarterly</note></topic><topic id="25" parent="0" x="197.56" y="499.37" text="Perimeter Security"></topic><topic id="26" parent="25" x="9.06" y="434.12" text="Facility access control"></topic><topic id="27" parent="26" x="-138.36" y="425.17" text="Locks"><note>Considered as delaying devices
Mechanical locks
1. Warder lock - basic padlock
2. Tumbler lock (pin,wafer,lever)
3. Combination lock
4. Cipher lock
Lock strengths
Grade 1 - commercial and industrial use
Grade 2 - heavy-duty residential/light-duty commercial
Grade 3 - residential/consumer
The cylinders within the locks fall into 3 main categories:
Low security - no pick or drill resistance
Medium security - a degree of pick resistance protection, any of three grades
High security - degree of pick protection, grade 1 and 2 locks</note></topic><topic id="28" parent="25" x="14.87" y="472.07" text="Personal access control"></topic><topic id="29" parent="28" x="-147.42" y="469.44" text="user- activated readers\Ntransponders "></topic><topic id="30" parent="25" x="-225.14" y="545.72" text="External Boundary\NProtection Mechanism"></topic><topic id="31" parent="30" x="-379.34" y="546.00" text="Access control\Nmechanisms"><note>Locks and keys, an electronic card access system, personnel awareness</note></topic><topic id="32" parent="30" x="-385.85" y="594.85" text="Physical barriers"><note>Fences, gates, walls, doors, windows, protected vents, vehicular barriers</note></topic><topic id="33" parent="32" x="-511.08" y="577.09" text="Fences"><note>3-5 feet only deter casual trespassers
6-7 feet considered too high to climb easily
8 feet often deter more determined intruder
Gauges and mesh size
Gauge is the thickness of the wires
PIDAS Fencing - perimeter intrusion and assessment system is a type of fencing that has sensors located on the wire mesh and at the base of the fence. Detects cut, climb attempt
It has a passive cable vibration sensor.
Very sensitive, may cause many FPs</note></topic><topic id="34" parent="32" x="-510.85" y="617.19" text="Gates"><note>Class I - residential usage
Class II - commercial use, where general public access is accepted
Class III - industrial usage, where limited access is expected
Class IV - restricted access, prison entrance ...
These classifications are developed and maintained by underwriters laboratory UL</note></topic><topic id="35" parent="30" x="-394.53" y="642.70" text="Intrusion detection"><note>Perimeter sensors, interior sensors, annunciation mechanism
IDSs can be used to detect changes in the following :
1. Beams of light
2. Sounds and vibrations
3. Motion
4. Different types of fields (microwave, ultrasonic, electrostatic)
5. Electric circuit
Characteristics:
- expensive and require human intervention
- a redundant power supply necessary
- should detect and be resistant to tampering
- fail-safe defaults to activated</note></topic><topic id="36" parent="35" x="-566.21" y="679.47" text="Electromechanical"><note>Break in a circuit</note></topic><topic id="37" parent="35" x="-570.66" y="718.94" text="Photoelectric/photometric"><note>Changes in light beam, can be used in a windowless rooms only</note></topic><topic id="38" parent="35" x="-539.62" y="757.12" text="Passive infrared PIR"><note>Changes of heat waves in the area</note></topic><topic id="39" parent="35" x="-510.20" y="803.74" text="Acoustical"><note>Microphones on floors, walls, ceiling detecting sounds made during a force entry</note></topic><topic id="40" parent="35" x="-504.20" y="849.74" text="Vibrations"></topic><topic id="41" parent="35" x="-482.20" y="895.74" text="Wave pattern\Nmotion detectors"><note>Generates a wave pattern and check the reflected wave for disturbance (microwave, ultrasonic, low frequency)</note></topic><topic id="42" parent="35" x="-440.20" y="941.74" text="Proximity/capacity\Ndetector"><note>Emits measurable magnetic field, alarm sounds if the field is disrupted. Usually used to protect particular objects ( art)</note></topic><topic id="43" parent="30" x="-267.47" y="940.70" text="Assessment"><note>Guards, CCTV cameras</note></topic><topic id="44" parent="43" x="-280.53" y="1015.45" text="CCTV"><note>Most of today's CCTV(close circuit TV) employ light-sensitive chips called charged-coupled devices CCDs.
CCD is an electrical circuit that receives input light from lens and converts it into an electronic signal.
2 main types of lenses:
- fixed focal length
- zoom (varifocal)
Focal length defines it's effectiveness in viewing objects from horizontal and vertical view.
Short focal length lenses provide wider-angel views, long focal provide narrower view.
For a warehouse 2.8 and 4.3 mm
For a entrance monitoring around 8 mm
Depth of field
Refers to the portion of the environment that is in focus when showing on monitor
CCTV lenses have irises, which control the amount of light that enters the lens.
Manual iris lense have a ring that can be manually turned and controlled.
Auto iris lens should be used in environments where the light changes, as in outdoor setting
Announciator system can alert if detects something suspicious on CCTV (movement)</note></topic><topic id="45" parent="30" x="-210.06" y="782.99" text="Response"><note>Guards, local law enforcement agencies</note></topic><topic id="46" parent="30" x="-124.29" y="812.41" text="Deterrents"><note>Signs, lightning, environmental design</note></topic><topic id="47" parent="25" x="-16.14" y="571.72" text="Intrusion\NDetection\NSystem"></topic><topic id="48" parent="25" x="10.86" y="619.72" text="Patrol Force Guards"></topic><topic id="49" parent="25" x="18.86" y="661.72" text="Dogs"></topic><topic id="50" parent="25" x="13.86" y="706.72" text="Auditing Physical Access"></topic></topics><relations></relations></mindmap></simplemind-mindmaps> | {
"repo_name": "ft44k/CISSP",
"stars": "30",
"repo_language": "None",
"file_name": "Domain 2 Access Control.smmx",
"mime_type": "text/xml"
} |
<?xml version="1.0" encoding="UTF-8"?>
<simplemind-mindmaps doc-version="3" generator="SimpleMindTouch" gen-version="1.8.0" device-type="ipad"><mindmap><meta><guid guid="FF07781FF7F200EC8765FD92"></guid><title text="Domain 3\NSecurity Architecture and Design"></title><page><visual-area x="-184.72" y="0.00" width="1590.78" height="847.56"></visual-area></page><style key="system.spring-levels"></style><auto-numbering style="disabled"></auto-numbering><scrollstate zoom="94" x="195.28" y="-75.00"></scrollstate><selection type="node" id="30"></selection><main-centraltheme id="0"></main-centraltheme></meta><topics><topic id="0" parent="-1" x="495.94" y="439.95" text="Domain 3\NSecurity Architecture and Design"></topic><topic id="1" parent="0" x="734.92" y="502.00" text="Computer Architecture"></topic><topic id="2" parent="1" x="865.65" y="507.49" text="CPU"></topic><topic id="3" parent="2" x="952.57" y="506.56" text="Multiprocessing\N.symmetric mode\N.asymmetric mode"></topic><topic id="4" parent="1" x="892.70" y="447.54" text="ISO/EIC 42010:2007"><note>International standard that provides guidelines on how to create and maintain system architectures
International standard on system architecture to allow for better quality, interoperability, extensibility,portability and security....</note></topic><topic id="5" parent="1" x="897.41" y="570.12" text="Operating system\Ncomponents"></topic><topic id="6" parent="5" x="1032.20" y="573.50" text="Process management"></topic><topic id="7" parent="6" x="1184.89" y="577.46" text="Cooperative multitasking\NPreemptive multitasking"></topic><topic id="8" parent="5" x="1018.33" y="616.81" text="Process isolation"></topic><topic id="9" parent="8" x="1205.36" y="646.87" text=".encapsulation of objects\N.time multiplexing of shared resources\N.naming distinctions\N.virtual memory mapping"></topic><topic id="10" parent="5" x="1015.78" y="667.31" text="Memory management"></topic><topic id="11" parent="10" x="1148.95" y="715.89" text="Memory types"></topic><topic id="12" parent="11" x="1254.75" y="719.56" text="RAM"></topic><topic id="13" parent="12" x="1359.56" y="729.53" text=".SRAM\N.DRAM\N.SDRAM\N.EDO RAM\N.BEDO RAM\N.DDR SDRAM "><note>SRAM or static RAM don't need continuous refreshing as DRAM, but it needs more transistors = bigger,more expensive, but faster
Usually has been used in cache
SDRAM, synchronized with the CPU so the speed is increased
EDO RAM, faster than DRAM, because it can capture the next block of data while the first block is being sent to the CPU
BEDO RAM, builds upon EDO, B stands for burst, which means it can send more data at once
DDR SDRAM, carries out operations on the rising and falling cycles of a clock pulse. So instead 1 operation per pulse it makes 2</note></topic><topic id="14" parent="11" x="1241.75" y="789.56" text="ROM"><note>Nonvolatile memory type</note></topic><topic id="15" parent="14" x="1347.71" y="817.19" text=".PROM\N.EPROM\N.EEPROM"><note>PROM
Can be programmed only once, the voltage used during this process burns out the fuses that connect the memory cells
EPROM
E means erasable by UV light
EEPROM
Electrically erasable, one byte at time
Flash memory
Erasing function takes place in blocks</note></topic><topic id="16" parent="5" x="1068.96" y="529.24" text="Interrupts"></topic><topic id="17" parent="16" x="1171.89" y="508.72" text=".programmed I/O\N.interrupt-driven I/O\N.I/O using DMA\N.premapped I/O\N.fully mapped. I/O"><note>Programmable I/O
CPU sends data to I/O and polls the device to see if it is ready....waste of time
Interrupt-driven I/O
When the device is done with its job, it send an interrupt to the CPU
I/O using DMA (direct memory access)
Way of transferring data between a device and the system memory without using CPU
Premapped I/O
Device is trusted and can access the memory directly
Fully mapped I/O
Device is not trusted , physical address is not given to the device, instead the device is working with logical addresses</note></topic><topic id="18" parent="0" x="836.92" y="382.00" text="Operating System\NArchitectures"></topic><topic id="19" parent="18" x="972.87" y="378.97" text="Monolithic "><note>All OS processes run in the kernel mode
MS-DOS, Windows 3.x</note></topic><topic id="20" parent="18" x="962.47" y="339.38" text="Layered "><note>Separates OS functionalities into hierarchical layers.
In this approach the system operates in kernel mode ring 0.
Layers allowed data hiding.
THE, VAX/VMS, Multics, Unix
Downfalls are performance, complexity, security.</note></topic><topic id="21" parent="18" x="965.75" y="302.24" text="Microkernel"><note>Smaller subset of critical kernel processes focused mainly on memory management and interprocess communication. Other components work from the user space..but this turned out to cause a lot of performance issues, because processing requires so many mode transitions.</note></topic><topic id="22" parent="18" x="972.30" y="262.05" text="Hybrid microkernel"><note>Microkernel still exists and carries out mainly interprocess communication and memory management responsibilities.
All of the other OS services work in client/server model. (Executive services)
So all OS processes run in kernel mode. Core processes run within a microkernel and others run in a client/ server model.</note></topic><topic id="23" parent="0" x="678.92" y="357.00" text="System Security\NAchitecture"><note>In 1972 US government released a report that outlined basic and foundational security requirements of counter systems that it would deem acceptable for purchase and deployment.
As time went by this resulted in Trusted Computer System Evaluation Criteria</note></topic><topic id="24" parent="23" x="789.61" y="270.54" text="Trusted Computing Base"><note>Collection of all the HW, SW, and firmware components within a system that provide security and enforce the system's security policy
Trusted path
Trustworthy software channel that is used for communication between two processes that cannot be circumvented.</note></topic><topic id="25" parent="23" x="797.49" y="316.73" text="Security perimeter"><note>Mechanism used to delineate between the components within and outside of the trusted computing base</note></topic><topic id="26" parent="23" x="630.87" y="297.34" text="Reference monitor"><note>Or an abstract machine, it is an access control concept that defines a set of design requirements of a reference validation mechanism (security kernel), which enforces an access control policy over subjects' ability to perform operations on objects on a system</note></topic><topic id="27" parent="23" x="701.87" y="233.34" text="Security kernel"><note>Implements the concept of the reference monitor
The security kernel must isolate processes carrying out the reference monitor concept, must be tamperproof, must be invoked for each access attempt</note></topic><topic id="28" parent="0" x="498.06" y="293.34" text="Security Models"><note>Model is symbolic representation of a policy.
Policy provides the abstract goals, model tells us the do's and don'ts necessary to fulfill these goals.</note></topic><topic id="29" parent="28" x="498.84" y="239.97" text="State Machine Models"><note>A state of a system is a snapshot of a system at one moment of time.
Developers must identify all initial states and outline how these can be changed (accepted inputs),so the various number of final states still ensure that the system is safe.</note></topic><topic id="30" parent="29" x="561.93" y="193.88" text="Information flow models"><note>Simple -> reading
* -> writing
Covert channels
is a way for an entity to receive information in an unauthorized manner. It is an information flow that is not controlled by a security mechanism.
2 types of covert channels
a) covert storage channel
b) covert timing channel
a) presence of a lock on a file could be interpreted as 1
b) eg using CPU time, using 1, rejecting 0</note></topic><topic id="31" parent="30" x="633.66" y="147.36" text="Integrity Models"><note>Goals of integrity models
1. Prevent unauthorized users from making modifications
2. Prevent authorized users from making improper modifications (separation of duties)
3. Maintain internal and external consistency (well-formed transaction)</note></topic><topic id="32" parent="31" x="796.85" y="101.76" text="Clark-Wilson Model"><note>Uses following elements:
Users - active agents
Transformation procedures TPs - programmed abstract operation like read,write,..
Constrained data items CDIs - can be manipulated only by TPs
Unconstrained data items UDIs - can be manipulated by users via primitive read,write operations
Integrity verification procedures IVPs - check the consistency of CDIs with external reality
Well formed transaction
is a series of transactions that are carried out to transfer the data from one consistent state to the other.
Clark-Wilson addresses each of 3 integrity goals.</note></topic><topic id="33" parent="31" x="696.75" y="102.25" text="Biba model"><note>Biba addresses the integrity of data within applications. So the Biba model uses a lattice of integrity levels instead of security levels.
3 main rules:
1. Simple integrity axiom ( no read down)
2. *-integrity axiom (no write up)
3. Invocation property - subject cannot request service of higher integrity
Biba model addresses only the first goal of integrity models!</note></topic><topic id="34" parent="30" x="511.08" y="136.50" text="Confidentiality models"></topic><topic id="35" parent="34" x="509.91" y="95.80" text="Bell-LaPadula"><note>Was developed to make sure secrets stay secrets, so it address confidentiality only(don't care about integrity)
All MAC systems are based on Bell-LaPadula model.
Multilevel security system - users with different clearances use the system, and the system process data at different classification levels.
3 main rules:
1. simple security rule ( no read up)
2. *-property rule (no write down)
3. strong star property rule
1. Subject at given at a given security level cannot read data that reside t a higher security level.
2.subject in a given security level cannot write information to a lower security level
3.subject can read and write only objects at the same level only
Tranquility principle - subjects' and objects' security levels cannot change in a manner that violates the security principle</note></topic><topic id="36" parent="30" x="781.05" y="153.21" text="Brewer and Nash Model"><note>Also known as Chinese Wall model
This model allows for dynamically changing access controls that protect against conflicts of interest.</note></topic><topic id="37" parent="29" x="343.30" y="191.71" text="Noninference Model"><note>Intent of this model is to address covert channels and inference attacks.</note></topic><topic id="38" parent="29" x="339.79" y="241.31" text="Lattice model"><note>A lattice model provides an upper bound and a lower bound of authorized access for subjects</note></topic><topic id="39" parent="29" x="331.38" y="288.97" text="Graham-Denning model"><note>This model shows how subjects and objects should be created and deleted. It also addresses how to assign specific access rights.</note></topic><topic id="40" parent="29" x="362.20" y="102.12" text="Harrison-Ruzzo-Ullman"><note>Deals with access rights of subjects and the integrity of those rights.
This model shows how a finite set of procedures can be available to edit the access rights of a subject.</note></topic><topic id="41" parent="0" x="180.82" y="304.26" text="Security Modes\Nof Operation"></topic><topic id="42" parent="41" x="163.83" y="245.18" text="Dedicated Security Mode"><note>"Our system holds secret data and we can all access it"
All users must have
1. Proper clearance for all information on the system
2. Formal access approval for all information on the system
3. A signed NDA for all information on the system
4. A valid need-to-know for all information
5. All users can access all data</note></topic><topic id="43" parent="41" x="39.26" y="255.69" text="System\NHigh-Security\NMode"><note>"Our system holds only secret data, but only some of us can access all of it"
All users must have
1. Proper clearance for all information on the system
2. Formal access approval for all information on the system
3. A signed NDA for all information on the system
4. A valid need-to-know for some information on the system
5. All users can access some data, based on their need-to-know</note></topic><topic id="44" parent="41" x="40.54" y="362.76" text="Multilevel Security Mode"><note>"Our system has various classifications of data, and each individual has the clearance and need-to-know to access only individual pieces of data."
Bell-LaPadula is an example of this model
All users must have
1. Proper clearance for some of the information on the system
2. Formal access approval for some of the information on the system
3. A signed NDA for all information on the system
4. A valid need-to-know for some of the information on the system
5. All users can access some data, based on their need-to-know, clearance, and formal access approval</note></topic><topic id="45" parent="41" x="36.76" y="314.21" text="Compartment\NSecurity Mode"><note>"Our system has various classifications of data, and each individual has the clearance to access all of the data, but not necessarily the need-to-know."
All users must have
1. Proper clearance for the highest level of data classification on the system
2. Formal access approval for some information on the system
3. A signed NDA for all information they will access
4. A valid need-to-know for some of the information on the system
5. All users can access some data, based on their need-to-know and formal access approval</note></topic><topic id="46" parent="41" x="196.43" y="361.79" text="Trust and assurance"><note>Trust means that a system uses all of its protection mechanism properly
Assurance is the level of confidence you have in this trust and that the protection mechanism behave properly.</note></topic><topic id="47" parent="0" x="299.96" y="541.68" text="Systems\NEvaluation\NMethods"></topic><topic id="48" parent="47" x="95.84" y="497.77" text="The Orange Book and\Nthe Rainbow Series"></topic><topic id="49" parent="48" x="-48.53" y="503.88" text="The Rainbow series"><note>These books provides detailed information and interpretations of certain orange book requirements and describe the evaluation processes.</note></topic><topic id="50" parent="49" x="-149.72" y="505.00" text="Red book"><note>Trusted network interpretation TNI
addresses security evaluation topics for networks and network components.</note></topic><topic id="51" parent="48" x="26.49" y="435.02" text="Orange book\NTCSEC"><note>Trusted Computer System Evaluation Criteria
Addresses single-system security
TCSEC addresses confidentiality, but not integrity. Functionality of sec mechanism and the assurance of those mechanism are not evaluated separately, but rather are combined and rated as whole.
The orange book mainly addresses government and military requirements.
Ratings
D - minimal protection
C - discretionary protection
C1 - discretionary security protection
C2 - controlled access protection
B - mandatory protection
B1 - labeled security
B2 - structured protection
B3 - security domains
A - verified protection
A1 - verified design</note></topic><topic id="52" parent="47" x="112.93" y="579.55" text="Information\NTechnology\NSecurity Evalution Criteria"><note>ITSEC separates the functionality and assurance ratings.
F1-10 rate the functionality
E0-6 rate the assurance
Higher is better
E0 = D
F1 + E1 = C1
F2 + E2 = C2
... B1,2,3
...A1</note></topic><topic id="53" parent="47" x="183.76" y="651.84" text="Common Criteria"><note>Provides more flexibility by evaluating a product against a protection profile, which is structured to address a real-world security needs.
After the evaluation the product is assigned an Evaluation Assurance Level EAL</note></topic><topic id="54" parent="53" x="321.96" y="665.30" text="ISO/EIC 15408"><note>The international standard used as the basis for the evaluation of security properties of products under the CC framework
15408-1 introduction and general evaluation model
15408-2 security functional components
15408-3 security assurance components</note></topic><topic id="55" parent="53" x="260.35" y="712.63" text="Evaluation\NAssurance Level"><note>EAL1 - functionally tested
EAL2 - structurally tested
EAL3 - methodically tested and checked
EAL4 - methodically designed,tested,reviewed
EAL5 - semiformally designed and tested
EAL6 - semiformally verified design and tested
EAL7 - formally verified design and tested
Where formally verified means it is based on a model that can be mathematically proven.</note></topic><topic id="56" parent="53" x="141.89" y="700.27" text="Protection profiles"><note>This is the mechanism used to describe a real-world need for a product. It describe the environmental assumptions, the objectives, and the functional and assurance level expectation.
Contains the following sections:
1. Descriptive elements - name of the profile and description of the security problem to be solved
2. Rationale - justifies the profile and gives more detailed description of the problem
3. Functional requirements - establish a protection boundary
4. Development assurance requirements - identifies the requirements on the product during the development phases from design to implementation
5. Evaluation assurance requirements - establish the type and intensity of the evaluation</note></topic><topic id="57" parent="0" x="447.92" y="609.00" text="Certification vs\NAccreditation"><note>Certification is a technical review that assesses the security mechanisms and evaluates their effectiveness.
Accreditation is management's official acceptance of the information in the certification process findings</note></topic><topic id="58" parent="0" x="601.92" y="616.00" text="Open vs Closed Systems"><note>Open system is built upon open standards, protocols, and interfaces. This type of architecture provides interoperability between products.
Closed system are proprietary.</note></topic><topic id="59" parent="0" x="748.92" y="571.00" text="Threats Review"></topic><topic id="60" parent="59" x="766.57" y="666.91" text=".maintanance hooks\N.time-of-Check/Time-of-use attacks"><note>Maintenance hooks are type of back doors, they are used during he development stage by programmers, they should be removed before the product release
TOC/TOU attacks when attacker jumps in between two tasks and modifies something to control the result
Race condition attack is when attacker makes processes execute out of sequence to control the result.</note></topic></topics><relations></relations></mindmap></simplemind-mindmaps> | {
"repo_name": "ft44k/CISSP",
"stars": "30",
"repo_language": "None",
"file_name": "Domain 2 Access Control.smmx",
"mime_type": "text/xml"
} |
CISSP
=====
MindMaps for the CISSP certification
| {
"repo_name": "ft44k/CISSP",
"stars": "30",
"repo_language": "None",
"file_name": "Domain 2 Access Control.smmx",
"mime_type": "text/xml"
} |
<?xml version="1.0" encoding="UTF-8"?>
<simplemind-mindmaps doc-version="3" generator="SimpleMindTouch" gen-version="1.8.0" device-type="ipad"><mindmap><meta><guid guid="77D2CA64603533107CFEE459"></guid><title text="Domain 2\NAccess Control"></title><page><visual-area x="0.00" y="0.00" width="1173.49" height="800.48"></visual-area></page><style key="system.spring-levels"></style><auto-numbering style="disabled"></auto-numbering><scrollstate zoom="98" x="571.00" y="201.00"></scrollstate><selection type="node" id="7"></selection><main-centraltheme id="0"></main-centraltheme></meta><topics><topic id="0" parent="-1" x="498.98" y="479.59" text="Domain 2\NAccess Control"><note>Are considered the first line of defense in asset protection
They are used to dictate how subject can access object. Defines how users should be identified, authenticated,authorized.</note></topic><topic id="1" parent="0" x="697.20" y="503.54" text="Identification, Authentication,\NAuthorization, and Accountability"></topic><topic id="2" parent="1" x="889.52" y="482.68" text="Identification and\Nauthentication"></topic><topic id="3" parent="2" x="1051.34" y="431.10" text="Identity management solutions:\N.directories\N.web access management\N.password management\N.legacy single sign-on\N.account management\N.profile update"></topic><topic id="4" parent="1" x="903.61" y="525.75" text="Password management"></topic><topic id="5" parent="4" x="1090.66" y="519.27" text="Self-service pwd reset\NAssisted pwd reset\NPassword synchronization"></topic><topic id="6" parent="1" x="878.61" y="562.75" text="Authorization"></topic><topic id="7" parent="6" x="1012.80" y="592.06" text="Default no access\NNeed to know\NAuthorization creep\N"></topic><topic id="8" parent="6" x="1002.56" y="646.14" text="Single Sign-on"></topic><topic id="9" parent="8" x="1102.82" y="680.12" text="Sesame"><note>SESAME
Secure European System for Applications in a Multi- vendor Environment
Where Kerberos uses tickets, SESAME uses PACs - Privileged Attribute Certificates
PAC contains:
- subjects identity
- access capabilities for the object
- access time period
- lifetime of the PAC
PAC is digitally signed by PAS ( attribute server)
PAS holds similar role as KDC
After the users successfully authenticates to the AS, he is presented with a token to give to the PAS. The PAS then creates a PAC for the users to present to the resource he is trying to access.</note></topic><topic id="10" parent="8" x="1107.82" y="715.88" text="Kerberos"><note>Kerberos is symmetric key-based single sign-on technology for distributed environments
Main components
.key distribution center KDC
- holds all principals' secret keys
.ticket granting service
- generates tickets
.authentication service AS
-returns TGT encrypted by user secret key
When user needs to access a resource
1. Sends TGT to TGS running on KDC
2. TGS creates a ticket which contains two instances of the session key ( encrypted by users' secret key and by the resource secret key). It contains also an authenticator.
3. User decrypts the session key and sends ticket to the resource (second session key is attached) + user authenticator
6. If the resource can decrypt the session key encrypted by its secret key, it knows that this request was authorized by the KDC + If the authenticator is a match then the resource knows that the principal info is correct
Authenticator contains principals IP, sequence number, timestamp</note></topic><topic id="11" parent="8" x="1106.03" y="645.83" text="GSS-API"><note>Generic Security Service Application Programming Interface
Generic API for client to server authentication
Kerberos version 5 and SESAME allow any application to use their auth functionality through GSS-API</note></topic><topic id="12" parent="8" x="1113.99" y="770.11" text=".Security domains\N.Directory Services\N.Thin Clients"></topic><topic id="13" parent="6" x="969.07" y="707.95" text="Markup language"><note>XML
SPML
.framework for exchanging user,resource,and service provisioning information between cooperating organizations.
Allows for automation of user management
XACML
.declarative access control policy language implemented in XML and a processing model, describes how to interpret security policies.
Allows two or more org to share application security policy. So you don't have to authenticate twice when moving from one app to another
SAML
.allows for the exchange of authentication and authorization data to be shared between security domains. It is one of the most used approaches to allow for single sign on capabilities within a web based environment.</note></topic><topic id="14" parent="0" x="662.20" y="437.54" text="Access Control Models"></topic><topic id="15" parent="14" x="839.36" y="372.82" text="Discretionary DAC"><note>The users can specify what type of access can occur to the objects they own.
DAC system grant or deny access based on the identity of the subject.
The most common implementation of DAC is through ACLs.
Most of the Operating systems are based on DAC.
Read - R
Write - W
Execute - E
Delete - D
Change - R, W, E , D but no changes to ACL, or ownership
Full control
The administrator may want to restrict the user actions, this type of access control is referred to as nondiscretionary.</note></topic><topic id="16" parent="14" x="832.34" y="334.43" text="Mandatory MAC"><note>It is based on a security label system.
Users are given a security clearance, data is classified.
Decision whether a subject can access an object is based on the clearance of the subject and the classification of the object.
A sensitivity label is made up of a classification and categories. Classification follow hierarchical structure, categories enforces need to know.
Categories can correspond to a department of the organization.
The rules how subject access objects are made by the organization security policy, configured by security admin, enforced by OS.
MAC-based systems are used by government- oriented agencies.
Publicly released MAC system are SE Linux (NSA), Trusted Solaris.
MAC systems are resistant to malware, but require a lot of administrative overhead and are not user friendly.
MAC is considered nondiscretionary.</note></topic><topic id="17" parent="14" x="837.34" y="414.43" text="Role based RBAC"><note>Access decisions are based on each subject's role and/or functional position
Role-based access control can be managed in the following ways:
1.Non-RBAC : users are mapped directly to applications and no roles are used
2. Limited RBAC : users are mapped to roles and to applications that do not have role based access functionality
3. Hybrid RBAC : users are mapped to multiaplication roles with only selected rights assigned to those roles
4. Full RBAC : users are mapped to enterprise roles</note></topic><topic id="18" parent="0" x="637.08" y="240.57" text="Access Control\NTechniques and\NTechnologies"></topic><topic id="19" parent="18" x="686.05" y="149.10" text="Rule-based access control"><note>Allows to define specific situation in which a subject can or cannot access an object.
Rule-based access control is a type of compulsory control, because the administrator sets the rules and the users cannot modify these controls.</note></topic><topic id="20" parent="18" x="744.29" y="201.50" text="Constrained\NUser\NInterface"><note>Restrict users' access abilities by not allowing them to request certain functions/ information/ resources.
1. Menus and shells
2. Database views
3. Physically constrained interfaces</note></topic><topic id="21" parent="18" x="778.65" y="254.00" text="Access Control Matrix"><note>Access rights can be assigned to subjects (capabilities) or to objects ( ACLs)
Capability table
Is bound to the subject. The capability corresponds to the subjects row in the matrix
ACL
Is bound to object, list of subjects that can access. The ACL represents the column in matrix.</note></topic><topic id="22" parent="18" x="568.77" y="102.78" text=".content-depended access control\N.context-depended access control"><note>Examples:
DB view - content depended
Stateful FW - context depended</note></topic><topic id="23" parent="0" x="438.98" y="352.78" text="Access Control\NAdministration"></topic><topic id="24" parent="23" x="446.67" y="288.43" text="Centralized\NAccess Control"></topic><topic id="25" parent="24" x="455.20" y="217.03" text=".RADIUS\N.TACACS\N.DIAMETER"><note>RADIUS
UDP based AAA protocol
encrypts the password only when transmitted from client to server
2^8 AVP
Works over PPP connections
Uses single-challenge response when authenticating a user, which is used for all activities.
TACACS
TCP based AAA protocol
TACACS+ encrypts all traffic between client and server
More AVPs than in RADIUS = more granularity
Support other protocols (AppleTalk,NetBios,IPX)
Uses multiple-challenge response for each of the AAA processes.
DIAMETER
TCP based AAA protocol
Consist of:
Base protocol - communication between entities
Extensions - allows use of various technologies
Authentication
- PAP, CHAP, EAP
Authorization
- redirects, secure proxies, relays, brokers
Accounting
- reporting,event monitoring, ROAMOPS</note></topic><topic id="26" parent="23" x="332.74" y="288.24" text="Decentralized\NAccess Control"><note>Example
Peer-to-peer working group</note></topic><topic id="27" parent="0" x="292.20" y="416.54" text="Access Control Methods"></topic><topic id="28" parent="27" x="117.79" y="376.83" text="Access control types:\N.administrative\N.physical\N.technical"><note>Administrative controls
.policy and procedures
.personnel controls
.supervisory structure
.security-awareness training
.testing
Physical controls
.network segregation
.perimeter security
.computer controls
.work area separation
.data backups
.cabling
.control zone
Technical controls
.system access
.network architecture
.network access
.encryption and protocols
.auditing</note></topic><topic id="29" parent="0" x="274.20" y="472.54" text="Accountability"></topic><topic id="30" parent="29" x="125.53" y="467.91" text="audit information\NSEM aka SIEM"></topic><topic id="31" parent="0" x="292.20" y="541.54" text="Access Control Practices"></topic><topic id="32" parent="31" x="123.93" y="553.81" text="Emanation security:\NTEMPEST\NWhite noise \NControl zone"></topic><topic id="33" parent="31" x="112.06" y="610.20" text="Object reuse"></topic><topic id="34" parent="0" x="335.20" y="600.54" text="Access Control\NMonitoring"></topic><topic id="35" parent="34" x="228.37" y="675.22" text="IDS & IPS\N.network based\N.host based"><note>HIDS and NIDS can be one of the following types:
.signature-based
..pattern matching - signatures
..stateful matching -sigs in context of a stream of activity
.anomaly-based (behavioral-based)
..statistical anomaly-based
..protocol anomaly-based
..traffic anomaly-based
..rule or heuristic based
.rule-based
Use of IF-THEN programming within expert system
Cannot detect new attacks
IPS
Content-based
.protocol analysis and signature matching
Rate base metric focuses on volume of traffic (DoS, slow and low)</note></topic><topic id="36" parent="34" x="319.02" y="694.68" text="Honeypot"></topic><topic id="37" parent="0" x="471.20" y="620.54" text="Threats to\NAccess Control"></topic><topic id="38" parent="37" x="453.80" y="693.37" text="Threat modeling"></topic><topic id="39" parent="37" x="550.94" y="694.31" text="Identity theft"><note>True-name
Theft uses personal information to open new accounts
Account takeover
Imposter uses personal information to gain access to the person's existing accounts.</note></topic></topics><relations></relations></mindmap></simplemind-mindmaps> | {
"repo_name": "ft44k/CISSP",
"stars": "30",
"repo_language": "None",
"file_name": "Domain 2 Access Control.smmx",
"mime_type": "text/xml"
} |
# Rules of Information Technology
Below are the Rules of Information Technology. They are inspired by the Rules of Acquisition. Feel free to do a PR to add new ones, but please also include a rule description page so that others can learn from your wisdom.
1. [Users lie, even when they don't mean to.](Rules/1.md)
1.1. When a user says "Everyone", they mean "one or more person"
2. [Nothing is more permanent than a temporary solution.](Rules/2.md)
3. [When estimating time, add at least 50%.](Rules/3.md)
4. [Everyone has a testing environment, some are lucky enough to have a separate production environment.](Rules/4.md)
5. [It was DNS.](Rules/5.md)
6. [Good, Cheap, Fast. Pick 1.](Rules/6.md)
7. [Security is important.](Rules/7.md)
8. [IT is a force multiplier.](Rules/8.md)
9. [Don't be afraid to promote your value.](Rules/9.md)
9.1. Don't be rude
10. [Never assume the person before you did a good job.](Rules/10.md)
10.1. You will make mistakes too.
11. [Don't forget to document.](Rules/11.md)
11.1. Any documentation is better than no documentation.
12. [Don't let perfect be the enemy of good.](Rules/12.md)
13. [Don't take it home with you.](Rules/13.md)
14. [If you are always on call, something is wrong.](Rules/14.md)
15. [You will break things.](Rules/15.md)
16. [If the CEO's car is worth more than the entire IT budget, look elsewhere.](Rules/16.md)
17. [Nobody buys a company to leave it alone.](Rules/17.md)
17.1. Private equity spells doom.
18. [Loyalty has to go both ways.](Rules/18.md)
18.1. Loyalty doesn't pay the rent.
19. [The infrastructure is not your baby.](Rules/19.md)
20. [If you are the smartest person in the room, you are in the wrong room.](Rules/20.md)
21. [Be kind, Rewind](Rules/21.md)
21.1. Users are people too
| {
"repo_name": "dbeta/RulesofIT",
"stars": "37",
"repo_language": "None",
"file_name": "13.md",
"mime_type": "text/plain"
} |
# 15 You will break things
If you are new to IT, you might think to yourself "I'm not going to make mistakes like my predecessors." You will. We are all human and all make mistakes.
Here's a little practical advice. Own your mistakes. Communicate well. Learn from them. Plan for failure. Try not to make the same mistake twice.
| {
"repo_name": "dbeta/RulesofIT",
"stars": "37",
"repo_language": "None",
"file_name": "13.md",
"mime_type": "text/plain"
} |
# 8 IT is a force multiplier
Rule 7 is very important, but also remember that IT, at its core, a force multiplier. Computers have always existed to allow humans to be more productive. The reason security is important is because nothing kills productivity quite as much as ransomware.
Remember that your goal should be to make sure other employees are as productive as possible. Sometimes that goal is longer term than you might realize. In our field, you might look at tickets as a production waster, but on a long view, you see that they help with change tracking, documentation, team work, tracking goals, and make sure things don't fall through the cracks.
| {
"repo_name": "dbeta/RulesofIT",
"stars": "37",
"repo_language": "None",
"file_name": "13.md",
"mime_type": "text/plain"
} |
# 5 It was DNS
There's an old IT proverb:
It's not DNS
There's no way it's DNS
It was DNS
It's a useful to remember how much DNS does for us. It is the backbone of nearly every single system on a network. Sure, from time to time you might be doing stuff over straight IP addresses, but chances are you are highly reliant on DNS to make sure things are communicating properly. Active Directory makes this twice as important, because a large portions of it require properly configured DNS to function.
| {
"repo_name": "dbeta/RulesofIT",
"stars": "37",
"repo_language": "None",
"file_name": "13.md",
"mime_type": "text/plain"
} |
# 6 Good, Cheap, Fast. Pick 1
Good takes time, and usually resources. There's no way around it. If you are doing the job right, not only are you doing the job, but you are also noting everything you did. This adds up. Don't sell your time short. And things cost money. Sometimes you can get away with free tools or random PowerShell scripts from blogs, but sometimes you need to buy a tool, and trying to avoid it is going to cause you headaches. Wrench makes a poor substitute for a wrench.
| {
"repo_name": "dbeta/RulesofIT",
"stars": "37",
"repo_language": "None",
"file_name": "13.md",
"mime_type": "text/plain"
} |
# 19 The infrastructure is not your baby
You may one day find yourself 5 years in on a job. Having rebuilt the infrastructure from a total mess to a well oiled machine. It's great to have pride in your work, but the infrastructure is owned by the company. You don't owe it anything, and need to be ready to let it go if greener pastures come along.
Don't get possessive either. Avoid using pronouns such as my or mine to describe a tech stack. You may find yourself needing to share your workload, and your instinct will tell you to protect your baby from the outsider, but that instinct is WRONG!
| {
"repo_name": "dbeta/RulesofIT",
"stars": "37",
"repo_language": "None",
"file_name": "13.md",
"mime_type": "text/plain"
} |
# 18 Loyalty has to go both ways
Companies want loyal employees, but it needs to be a two way street. If a company isn't showing loyalty back, don't waste your energy being loyal to them.
## Sub Rules
### Loyalty doesn't pay the rent
You might find yourself in a nice job with nice people. Really respected and treated right, but sometimes you need to cover the rent. Don't beat yourself up about finding another job. | {
"repo_name": "dbeta/RulesofIT",
"stars": "37",
"repo_language": "None",
"file_name": "13.md",
"mime_type": "text/plain"
} |
# 20 If you are the smartest person in the room, you are in the wrong room
You will never grow if you don't surround yourself with people smarter than you. Find a peer group. You will be both humbled and emboldened.
| {
"repo_name": "dbeta/RulesofIT",
"stars": "37",
"repo_language": "None",
"file_name": "13.md",
"mime_type": "text/plain"
} |
# 11 Don't forget to document
Documenting your work has oh so many benefits. At first it may seem like it is a waste of time. Slowing you down when you have precious little time to spare. Eventually you will look back and wonder what the heck you were doing. Whether it is a firewall config, or a line of code, a little documentation will go a long way.
### 11.1 Any documentation is better than no documentation
Although it can be frustrating to have half the picture, that's still more useful than no picture. Do yourself a favor and make notes, store them somewhere you or others can find them. They don't have to be good, but the need to exist.
### 11.2 All documentation lies
People write documentation based on how the writer perceives it, not on how it actually works. Documentation also gets stale rather quickly. Don't be afraid to verify documented information.
| {
"repo_name": "dbeta/RulesofIT",
"stars": "37",
"repo_language": "None",
"file_name": "13.md",
"mime_type": "text/plain"
} |
# 10 Never assume the person before you did a good job
Check back behind the last person, they probably made some mistakes, and that may be where your problems start.
## Sub Rules
### 10.1 You will make mistakes too
Don't be so hard on the last person, you will make mistakes too. Someone else will have to mop up after you in some years, if you are lucky, it will be you doing the mopping.
| {
"repo_name": "dbeta/RulesofIT",
"stars": "37",
"repo_language": "None",
"file_name": "13.md",
"mime_type": "text/plain"
} |
# 3 When estimating time, add at least 50%
The job always needs more time than you expected. Give yourself a some extra time. What if something crazy happens, things go terribly not to plan? Without a buffer, you will find yourself over promising and under delivering. Give yourself some head room for issues, mistakes, and documentation.
| {
"repo_name": "dbeta/RulesofIT",
"stars": "37",
"repo_language": "None",
"file_name": "13.md",
"mime_type": "text/plain"
} |
# 7 Security is important
Very often when setting up or modifying systems, security is skipped. Security isn't always free. It isn't always easy. It doesn't always directly increase production. All of that is true, but it's hard to overstate the inconvenience of a security breach.
There is no perfect solution. You will never be "Done" securing your systems. Every change, addition, or removal should include a thought for security.
Sometimes you have to make the hard choices and choose functionality over security, but those should be known. Preferably choices in writing, signed off by someone.
| {
"repo_name": "dbeta/RulesofIT",
"stars": "37",
"repo_language": "None",
"file_name": "13.md",
"mime_type": "text/plain"
} |
# 2 Nothing is more permanent than a temporary solution
If you are crunched for time and put in a temporary shim, you will almost certainly not have the time to properly replace it. Try to do things properly the first time. Making sure you have enough time is Rule 3's job.
| {
"repo_name": "dbeta/RulesofIT",
"stars": "37",
"repo_language": "None",
"file_name": "13.md",
"mime_type": "text/plain"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.