Summary of CISSP Domain 4: Communication and Network Security
Summary of CISSP Domain 4: Communication and Network Security
1. Network Architecture and Design
This section covers the principles of secure network architecture, including segmentation, defense-in-depth strategies, and security controls.
1.1 Secure Network Architecture Concepts
  • Defense in Depth: Implementing multiple layers of security controls to reduce risk.
  • Segmentation: DMZ (Demilitarized Zone): A buffer zone between the internal network and external threats. VLANs (Virtual Local Area Networks): Logical segmentation to restrict broadcast domains. Microsegmentation: Limits east-west traffic within a data center.
  • Zero Trust Architecture (ZTA): No implicit trust; requires verification at all levels.
  • Software-Defined Networking (SDN): Centralized management of network resources, enhancing security and flexibility.
  • Cloud Networking: Secure cloud network designs (e.g., Virtual Private Clouds (VPCs), Security Groups, Network ACLs).
1.2 Network Topologies
  • LAN (Local Area Network)
  • WAN (Wide Area Network)
  • MAN (Metropolitan Area Network)
  • SAN (Storage Area Network)
  • CAN (Campus Area Network)
1.3 Network Security Models
  • OSI Model: Understand security at each of the 7 layers.
  • TCP/IP Model: Secure transport and network protocols like TCP, UDP, and IPsec.
2. Secure Network Components and Devices
Understanding different network devices and their security implications.
2.1 Network Devices and Security Controls
  • Firewalls: Packet-filtering, stateful inspection, next-gen firewalls (NGFW). Host-based vs. network-based firewalls.
  • Intrusion Detection & Prevention Systems (IDS/IPS): IDS = Detects attacks (passive). IPS = Prevents attacks (active).
  • Proxies: Forward and reverse proxies for traffic filtering.
  • Load Balancers: Distribute traffic and mitigate DoS attacks.
  • DDoS Mitigation Devices: Scrub malicious traffic.
2.2 Network Access Control (NAC)
  • 802.1X Authentication: Uses RADIUS for device authentication.
  • MAC Filtering: Restricts access based on device MAC addresses.
  • Port Security: Limits devices that can connect to a switch.
3. Network Protocols and Security
Understanding secure and insecure protocols, cryptographic protections, and transmission methods.
3.1 Common Network Protocols
  • Secure Protocols: HTTPS (SSL/TLS): Secure web traffic. SSH (Secure Shell): Secure remote access. IPsec (VPN security): Encrypts network traffic. SFTP (Secure File Transfer Protocol).
  • Insecure Protocols: (Should be replaced with secure versions) Telnet (Use SSH instead). FTP (Use SFTP or FTPS instead). HTTP (Use HTTPS instead).
3.2 Wireless Network Security
  • WPA3: Strongest encryption for Wi-Fi networks.
  • WPA2-Enterprise: Uses RADIUS for authentication.
  • MAC Spoofing and Evil Twin Attacks: Security risks of public Wi-Fi.
  • Wi-Fi Encryption Methods: WEP (weak), WPA, WPA2, WPA3.
3.3 Virtual Private Networks (VPNs)
  • Remote Access VPN: Employees connect securely to a corporate network.
  • Site-to-Site VPN: Securely connects branch offices.
  • SSL/TLS VPN vs. IPsec VPN: SSL VPN = Browser-based, easier deployment. IPsec VPN = Stronger encryption, requires VPN client.
4. Network Attacks and Countermeasures
Recognizing common network attacks and applying security defenses.
4.1 Common Network-Based Attacks
  • Denial of Service (DoS) & Distributed DoS (DDoS): Overwhelm network resources.
  • Man-in-the-Middle (MITM): Intercepting network traffic.
  • Session Hijacking: Taking over a valid network session.
  • ARP Spoofing: Spoofing MAC addresses to redirect traffic.
  • DNS Poisoning: Redirecting users to malicious websites.
  • Packet Sniffing: Capturing network traffic using tools like Wireshark.
4.2 Countermeasures
  • DDoS Mitigation: Rate limiting, blackholing, and cloud-based protection.
  • Network Encryption: IPsec, TLS, and VPNs to protect data in transit.
  • Intrusion Detection & Prevention Systems (IDS/IPS): To detect and stop attacks.
  • Network Segmentation: Reduce attack surface and limit lateral movement.
5. Secure Network Communication
Ensuring data confidentiality, integrity, and availability during transmission.
5.1 Cryptographic Protocols for Secure Communication
  • TLS (Transport Layer Security): Secure web traffic.
  • IPsec (Internet Protocol Security): Secure VPNs and network traffic.
  • PKI (Public Key Infrastructure): Uses digital certificates for authentication.
  • End-to-End Encryption (E2EE): Encrypts data between sender and receiver.
5.2 Secure Remote Access Methods
  • RDP (Remote Desktop Protocol): Secure with VPN, MFA, and gateway servers.
  • SSH (Secure Shell): Encrypts remote terminal access.
  • Cloud-Based Remote Work Solutions: Zero Trust, endpoint security, MFA.
6. Network Monitoring and Incident Response
Monitoring network activity and responding to security incidents.
6.1 Logging & Monitoring
  • SIEM (Security Information and Event Management): Aggregates logs and detects anomalies.
  • NetFlow & Packet Capture: Analyze network traffic trends.
6.2 Incident Detection & Response
  • Network Forensics: Investigating security breaches.
  • Anomaly Detection: Identifying unusual network behavior.
  • Threat Intelligence Integration: Proactive security monitoring.
Key Takeaways for CISSP Exam
  1. Understand secure network architecture – segmentation, DMZs, VLANs, SDN, and Zero Trust.
  2. Know key security protocols – TLS, IPsec, SSH, HTTPS, and SFTP.
  3. Recognize common network attacks – MITM, DDoS, ARP poisoning, and session hijacking.
  4. Understand network security devices – firewalls, IDS/IPS, proxies, load balancers.
  5. Be familiar with secure remote access – VPNs, RDP, and SSH.
  6. Know how to monitor and respond to threats – SIEM, logging, and anomaly detection.
This domain emphasizes defensive strategies to ensure secure data transmission and network protection against evolving cyber threats.
2
1 comment
Fouad Ahmed
6
Summary of CISSP Domain 4: Communication and Network Security
CISSP Study Group
skool.com/cybersecurity-study-group
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
Powered by