Shared Flashcard Set

Details

Advance Networking
Midterm CPS 450
50
Computer Networking
Undergraduate 4
03/01/2016

Additional Computer Networking Flashcards

 


 

Cards

Term
WORMS
Definition

Programs that run independently between computers and across networks.  They Make use of all internet networking. Emails, file transfers. Hard to contain.

Term
KEY PAIR
Definition

Encryption.  Combination of Public and Private Keys.  Public-known to everyone, Private-only by the receiving party.  This is Called Asymmetrical. Use private key to decrypt both pieces.

 

Symmetrical encryption.  More Secure.  Both are the only people with Encryption Key. You and receiver are the only one with decryption key. Problem is how you get the key securely. 

Term
CERTIFICATE AUTHORITIES
Definition

They assign the digital certificates. Verisign. They are the ones who validate the authenticity of a website. 

Term
255.255.255.255
Definition

This is a broadcast message.  Another use is for the Access Control Lists (ACL). Used for any keyword. Blanket statement. Like delete *.* All encompassing.  

Term
VPN GATEWAY
Definition

Virtual Private Network. Site to Site VPN. 1 location to another. Sits on edge of the LAN and establishes the connection between sites. VPN establishes a connection with another VPN on the other end.

 

 

Term
LaaS
Definition

Infrastructure as a service. Hardware services in the cloud and provide virtually. Such as servers, switches, etc. 

Term
SaaS
Definition
Software as a Service. Cloud using applications, online user interface, any piece of software over the internent
Term
PCI DSS
Definition

Payment Card Industry Data Security Standard.  A security standard for credit card data and transactions. Requires network segmentation. 

Term
SEIM SYSTEM
Definition
Security Information and Event management. A System of collecting and analyzing information generated by firewalls, Intrusion detection systems, and  IPS Intrusion protection systems. Analyzes data. 
Term
TKIP
Definition

Temporal Control Integrity Protocol. Encryption protocol designed as an integrity check for WEP. Wirless Encrption Protcol rather than sophisticated security protocols.

 

 

Term
NETWORK LAYER
Definition

Layer 3.  Where firewalls and IPSEC operate as well as IP, Internet. The packet movement work at this level. Not Frames. Emails. 

Term
PAP
Definition

Password Authentication  Protocol. Authenticated information sent in Clear Text. No encryption. Authentication information is sent in CLEAR TEXT. Not encrypted. Worthless.

 

 

Term
BANNER-GRABBING-ATTACK
Definition

An attack in which hackers transmit bogus requests or connection to servers or applications in order to harvest usable information in order to guide the attack efforts. On the front door of servers. 

Term
IPSEC
Definition
Security Encryption Protocol. Secure IP.  Requires a regular reestablishment of a connection and can be used with any TCP/IP Transmission
Term
REVERSE PROXY
Definition

Reverse of Proxy. Outside world coming into company network Internal via proxy. Outside-Proxy_firewall. Outside world and come through box to one resource.  Don’t want everyone coming through the firewall. The server on the inside can’t trust everyone from the outside. Everyone is shielded on the inside. You can cache as well. Goes out and dumps website on server. Each web page has a TTL. Firewall trusts the Proxy and lets in it to the one resource. 

Term
NON-REPUDIATION
Definition

Security principal providing proof of delivery and Proof of senders Identification. Verifies we got it and were it came from. 

Term
LOGIC BOMB
Definition

Type of virus that’s dormant till specific condition is met.  Change of a file or match in current time. Example: i.e. if word printed is yes. 

Term
MAN-IN-THE-MIDDLE
Definition
Somebody redirecting or capturing secure Transmissions as they occur.  Somebody intercepting packets
Term
UNICAST
Definition
Means Point to Point. One. Such as VOIP. This is how the phone works. It is unicast. Like sending a message to another computer.
Term
IP SUBNETTING
Definition

Hosts or Networks first questions. 2u-2>=hosts unmasked bits, 2^n>=networks, masked bits. 

Term
IP RANGES
Definition
Term
NET ID
Definition
Term
USABLE SPACE RANGE
Definition
Term
BROADCAST ID
Definition

The  last address in a range. In binary all ones in the client section of that address are broadcast. Everyone gets a message. 

Term
DEFAULT GATEWAY
Definition
It must be in the address range of the network you’re on. Router
Term
CIDR NOTATION
Definition

Classless interdomain routing. Designation address/ number ones in subnet mask.

Term
Asymmetrical
Definition
 Use private key to decrypt both pieces.
Term
What Encryption is the most secure?
Definition
Symmetrical encryption
Term

What combination of Keypairs are there

Definition
Public, Private
Term
What is Asymmetrical
Definition
Combination of Public and Private Keys.  Public-known to everyone, Private-only by the receiving party.
Term
Problem with Symmetrical encryption
Definition
Problem is how you get the key securely
Term
Public Key is
Definition
known to everyone
Term

Private Key is 

Definition
known only by the receiving party
Term
ACL
Definition
Access Control Lists
Term
IPS
Definition
Intrusion protection systems
Term
IDS
Definition
Intrusion detection systems
Term

TKIP (means)

Definition
Temporal Control Integrity Protocol
Term

What Layer is NETWORK LAYER

 

Definition
Layer 3, Network layer
Term
PAP (meaning)
Definition
Password Authentication  Protocol
Term
What Protocol Authentication information is sent in CLEAR TEXT
Definition
PAP
Term

IPSEC (meaning)

Definition
IP Security Encryption Protocol
Term
Verifies we got it and were it came from.
Definition

NON-REPUDIATION

Term

What is 255.255.255.255 doing

Definition
Broadcasts to all
Term
CIDR (meaning)
Definition
Classless interdomain routing
Term
To find number of HOSTS
Definition
2^u-2>=hosts 
Term
To Find Networks
Definition
2^n>=networks
Term
The  last address in a range is called
Definition
Broadcast ID
Term
The packet movement work at this level
Definition

NETWORK LAYER, layer 3

Term
What Encryption protocol designed as an integrity check for WEP
Definition
TKIP
Term
In IP SUBNETTING we are looking for
Definition

IP RANGES

NET ID

 

USABLE SPACE RANGE

Broadcast ID

SubnetMask

Default Gateway

Supporting users have an ad free experience!