Shared Flashcard Set

Details

Domain 2 - Telecommunications & Network Security
CISSP - Domain 2 - Telecommunications & Network Security Terms From AIO 6th Addition
128
Computer Networking
Professional
11/23/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
Telecommunications
Definition
the electrical transmission of data among systems, whether through analog, digital, or wireless transmission types.
Term
protocol
Definition
a standard set of rules that determines how systems will communicate across networks
Term
open network architecture
Definition
one that no vendor owns, that is not proprietary, and that can easily integrate various technologies and vendor implementations of those technologies.
Term
encapsulation
Definition
message is constructed within a program on one computer and is then passed down through the network protocol’s stack. A protocol at each layer adds its own information to the message; thus, the message grows in size as it goes down the protocol stack. The message is then sent to the destination computer, and the encapsulation is reversed by taking the packet apart through the same steps used by the source computer that encapsulated it.
Term
open systems
Definition
are capable of communicating with other open systems because they implement international standard protocols and interfaces.
Term
OSI - application layer
Definition
layer 7 - works closest to the user and provides file transmissions, message exchanges, terminal sessions, and much more.

This layer does not include the actual applications, but rather the protocols that support the applications.

When an application needs to send data over the network, it passes instructions and the data to the protocols that support it at the application layer. This layer processes and properly formats the data and passes the same down to the next layer within the OSI
model.

Some examples of the protocols working at this layer are the Simple Mail Transfer Protocol (SMTP), Hypertext Transfer Protocol (HTTP), Line Printer Daemon (LPD), File Transfer Protocol (FTP), Telnet, and Trivial File Transfer Protocol (TFTP).
Term
OSI - presentation layer
Definition
layer 6 - receives information from the application layer protocol and puts it in a format all computers following the OSI model can understand. For example: the sender could create a Word file in Word 2010, while the receiver uses Open Office. The receiver can open this file because the presentation layer on the sender’s system converted the file to American Standard Code for Information Interchange(ASCII), and the receiver’s computer knows it opens these types of files with its word processor, Open Office. This layer also handles data compression and encryption issues. There are no protocols that work at the presentation layer.
Term
OSI - session layer
Definition

layer 5, is responsible for establishing a connection between the two applications, maintaining it during the transfer of data, and controlling the release of this connection

 

works in three phases: connection establishment, data transfer, and connection release.

 

Session layer protocols control application-to-application communication

 

Some protocols that work at this layer are Structured

Query Language (SQL), NetBIOS, and remote procedure call (RPC).

Term
Dialog management
Definition
When the conversation is over, this path is broken down and all parameters are set back to their original settings
Term
OSI - transport layer
Definition

provides end-to-end data transport services and establishes the logical connection between two communicating computers.

 

they will first agree on how much information each computer will send at a time, how to verify the integrity of the data once received, and how to determine whether a packet was lost along the way.

 

The main protocols that work at this layer are TCP, UDP, Secure Sockets Layer (SSL), and Sequenced Packet Exchange (SPX)

 

Term
OSI - network layer
Definition

layer 3 - The main responsibilities of the network layer are to insert information into the packet’s header so it can be properly addressed and routed, and then to actually route the packets to their proper destination

 

The protocols at the network layer must determine the best path for the packet to take.

 

IP is a common protocol working at the network layer.

Other routing protocols are the Internet Control Message Protocol (ICMP), Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Border Gateway Protocol (BGP), and Internet Group Management Protocol (IGMP).

Term
OSI - data link layer
Definition

The outer format of the data packet changes slightly at each layer, and it comes to a point where it needs to be translated into the LAN or wide area network (WAN) technology binary format for proper line transmission

 

LAN and WAN technologies can use different protocols, network interface cards (NICs), cables, and transmission methods. Each of these components has a different header data format structure, and they interpret electricity voltages in different ways. The data link layer is where the network stack knows what format the data frame must be in to transmit properly over Token Ring, Ethernet, ATM, or Fiber Distributed Data Interface (FDDI) networks.

 

divided into two functional sublayers: the Logical Link Control (LLC) and the Media Access Control (MAC).

 

protocols that work at the data link layer are the Point-to Point Protocol (PPP), ATM, Layer 2 Tunneling Protocol (L2TP), FDDI, Ethernet, and Token Ring.

Term
Logical Link Control (LLC)
Definition
The LLC, defined in the IEEE 802.2 specification, communicates with the protocol immediately above it, the network layer.
Term
Media Access Control (MAC)
Definition
The MAC will have the appropriately loaded protocols to interface with the protocol requirements of the physical layer.
Term
OSI - physical layer
Definition

layer 1 - converts bits into voltage for transmission

 

This layer controls synchronization, data rates, line noise, and transmission techniques.

Term
TCP/IP
Definition
Transmission Control Protocol/Internet Protocol - is a suite of protocols that governs the way data travel from one device to another.
Term
connection-oriented protocol
Definition
which means it ensures packets are delivered to the destination computer.
Term
Connectionless protocol
Definition
It has neither packet sequencing nor flow and congestion control, and the destination does not acknowledge every packet it receives
Term
IP
Definition
connectionless protocol that provides the addressing and routing capabilities for each package of data.
Term
well-known ports
Definition
Port numbers up to 1023 (0 to 1023)
Term
ports
Definition
UDP and TCP use ports to communicate with upper OSI layers and to keep track of various conversations that take place simultaneously. The ports are also the mechanism used to identify how other computers access services.
Term
socket
Definition
When a TCP or UDP message is formed, source and destination ports are contained within the header information along with the source and destination IP addresses
Term
Registered ports
Definition
Ports 1024 to 49151 can be registered with the Internet Corporation for Assigned Names and Numbers (ICANN) for a particular use. Vendors register specific ports to map to their proprietary software
Term
Dynamic ports
Definition
Ports 49152 to 65535 and are available to be used by any application on an “as needed” basis.
Term
full duplex
Definition
which means transmission in both directions is possible using the same transmission line.
Term
session hijacking
Definition
If an attacker can correctly predict the TCP sequence numbers that two systems will use, then she can create packets containing those numbers and fool the receiving system into thinking that the packets are coming from the authorized sending system. She can then take over the TCP connection between the two systems.
Term
subnet
Definition
A subnet is created from the host portion of an IP address to designate a “sub” network. This allows us to further break the host portion of the address into two or more logical groupings
Term
Subnetting
Definition
allows large IP ranges to be divided into smaller, logical, and more tangible network segments.
Term
CIDR
Definition
classless interdomain routing (CIDR) was created because a Class B address range is usually too large for most companies, and a Class C address range is too small, so CIDR provides the flexibility to increase or decrease the class sizes as necessary. CIDR is the method to specify more flexible IP address classes.
Term
Time to Live (TTL)
Definition
IP provides a Time to Live (TTL) value that is decremented every time the packet passes through a router.
Term
Type of Service (ToS)
Definition
IP can also provide a Type of Service (ToS) capability, which means it can prioritize different packets for time-sensitive functions.
Term
jumbograms
Definition
larger packets provided by IPv6
Term
Automatic tunneling
Definition
a technique where the routing infrastructure automatically determines the tunnel endpoints so that protocol tunneling can take place without preconfiguration.
Term
Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
Definition
Treats the IPv4 network as a virtual IPv6 local link, with mappings from each IPv4 address to a link-local IPv6 address.
Term
802.1AE
Definition
802.1AE is the IEEE MAC Security standard (MACSec), which defines a security infrastructure to provide data confidentiality, data integrity, and data origin authentication. Where a Virtual Private Network (VPN) connection provides protection at the higher networking layers, MACSec provides hop-by-hop protection at layer 2
Term
802.1AR
Definition
defines a globally unique per-device secure identifier cryptographically bound to the device through the use of public cryptography and digital certificates.
Term
UDP
Definition
User Datagram Protocol (UDP) Connectionless, unreliable transport layer protocol, which is considered a “best effort” protocol.
Term
SYN flood
Definition
DoS attack where an attacker sends a succession of SYN packets with the goal of overwhelming the victim system so that it is unresponsive to legitimate traffic.
Term
6to4
Definition
Transition mechanism for migrating from IPv4 to IPv6. It allows systems to use IPv6 to communicate if their traffic has to transverse an IPv4 network.
Term
Teredo
Definition
Transition mechanism for migrating from IPv4 to IPv6. It allows systems to use IPv6 to communicate if their traffic has to transverse an IPv4 network, but also performs its function behind NAT devices.
Term
Bandwidth
Definition
refers to the number of electrical pulses that can be transmitted over a link within a second
Term
Data throughput
Definition
is the actual amount of data that can be carried over a connection.
Term
Digital signals
Definition
Binary digits are represented and transmitted as discrete electrical pulses. Signaling allows for higher data transfer rates and high data integrity compared to analog signaling.
Term
Analog signals
Definition
Continuously varying electromagnetic wave that represents and transmits data. Carrier signals vary by amplification and frequency.
Term
Asynchronous communication
Definition
Transmission sequencing technology that uses start and stop bits or similar encoding mechanism. Used in environments that transmit a variable amount of data in a periodic fashion.
Term
Synchronous communication
Definition
Transmission sequencing technology that uses a clocking pulse or timing scheme for data transfer synchronization.
Term
Baseband transmission
Definition
Uses the full bandwidth for only one communication channel and has a low data transfer rate compared to broadband.
Term
Broadband transmission
Definition
Divides the bandwidth of a communication channel into many channels, enabling different types of data to be transmitted at one time.
Term
Unshielded twisted pair
Definition
Cabling in which copper wires are twisted together for the purposes of canceling out EMI from external sources. UTP cables are found in many Ethernet networks and telephone systems.
Term
Shielded twisted pair
Definition
Twisted-pair cables are often shielded in an attempt to prevent RFI and EMI. This shielding can be applied to individual pairs or to the collection of pairs.
Term
Attenuation
Definition
Gradual loss in intensity of any kind of flux through a medium. As an electrical signal travels down a cable, the signal can degrade and distort or corrupt the data it is carrying.
Term
Crosstalk
Definition
A signal on one channel of a transmission creates an undesired effect in another channel by interacting with it. The signal from one cable “spills over” into another cable.
Term
Plenum cables
Definition
Cable is jacketed with a fire-retardant plastic cover that does not release toxic chemicals when burned.
Term
Ring topology
Definition
Each system connects to two other systems, forming a single, unidirectional network pathway for signals, thus forming a ring.
Term
Bus topology
Definition
Systems are connected to a single transmission channel (i.e., network cable), forming a linear construct.
Term
Star topology
Definition
Network consists of one central device, which acts as a conduit to transmit messages. The central device, to which all other nodes are connected, provides a common connection point for all nodes.
Term
Mesh topology
Definition
Network where each system must not only capture and disseminate its own data, but also serve as a relay for other systems; that is, it must collaborate to propagate the data in the network.
Term
Ethernet
Definition
Common LAN media access technology standardized by IEEE 802.3. Uses 48-bit MAC addressing, works in contention-based networks, and has extended outside of just LAN environments.
Term
Token ring
Definition
LAN medium access technology that controls network communication traffic through the use of token frames. This technology has been mostly replaced by Ethernet.
Term
Fiber Distributed Data Interface
Definition
Ring-based token network protocol that was derived from the IEEE 802.4 token bus timed token protocol. It can work in LAN or MAN environments and provides fault tolerance through dual-ring architecture.
Term
Carrier sense multiple access with collision detection
Definition
A media access control method that uses a carrier sensing scheme. When a transmitting system detects another signal while transmitting a frame, it stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame. This reduces collisions on a network.
Term
Carrier sense multiple access with collision avoidance
Definition
A media access control method that uses a carrier sensing scheme. A system wishing to transmit data has to first listen to the channel for a predetermined amount of time to determine whether or not another system is transmitting on the channel. If the channel is sensed as “idle,” then the system is permitted to begin the transmission process. If the channel is sensed as “busy,” the system defers its transmission for a random period of time.
Term
Internet Group Management Protocol (IGMP)
Definition
Used by systems and adjacent routers on IP networks to establish and maintain multicast group memberships.
Term
Media access control (MAC)
Definition
Data communication protocol sublayer of the data link layer specified in the OSI model. It provides hardware addressing and channel access control mechanisms that make it possible for several nodes to communicate within a multiple-access network that incorporates a shared medium.
Term
Address Resolution Protocol (ARP)
Definition
translates the IP address into a MAC address
Term
Dynamic Host Configuration Protocol (DHCP)
Definition
A network configuration service for hosts on IP networks. It assigns IP addresses, DNS server, subnet mask, and other important network configuration data to each host through automation.
Term
DHCP snooping
Definition
A series of techniques applied to ensure the security of an existing DHCP infrastructure through tracking physical locations, ensuring only authorized DHCP servers are accessible, and hosts use only addresses assigned to them.
Term
Reverse Address Resolution Protocol (RARP) and Bootstrap Protocol (BootP)
Definition
Networking protocols used by host computers to request the IP address from an administrative configuration server.
Term
Internet Control Message Protocol (ICMP)
Definition
A core protocol of the IP suite used to send status and error messages.
Term
Ping of Death
Definition
A DoS attack type on a computer that involves sending malformed or oversized ICMP packets to a target.
Term
Smurf attack
Definition
A DDoS attack type on a computer that floods the target system with spoofed broadcast ICMP packets.
Term
Fraggle attack
Definition
A DDoS attack type on a computer that floods the target system with a large amount of UDP echo traffic to IP broadcast addresses.
Term
Simple Network Management Protocol (SNMP)
Definition
A protocol within the IP suite that is used for network device management activities through the use of a structure that uses managers, agents, and Management Information Bases.
Term
Domain Name System (DNS)
Definition
resolves hostnames into IP addresses and has distributed databases all over the Internet to provide name resolution.
Term
DNS zone transfer
Definition
The process of replicating the databases containing the DNS data across a set of DNS servers.
Term
DNSSEC
Definition
A set of extensions to DNS that provide to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attack types.
Term
Simple Mail Transfer Protocol (SMTP)
Definition
An Internet standard protocol for electronic mail (e-mail) transmission across IP-based networks.
Term
Post Office Protocol (POP)
Definition
An Internet standard protocol used by e-mail clients to retrieve e-mail from a remote server and supports simple download-and-delete requirements for access to remote mailboxes.
Term
Internet Message Access Protocol (IMAP)
Definition
An Internet standard protocol used by e-mail clients to retrieve e-mail from a remote server. E-mail clients using IMAP generally leave messages on the server until the user explicitly deletes them.
Term
Simple Authentication and Security Layer (SASL)
Definition
A framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols and allows any authentication mechanism supported by SASL to be used in any application protocol that uses SASL.
Term
Autonomous system (AS)
Definition
Open mail relay An SMTP server configured in such a way that it allows anyone on the Internet to send e-mail through it, not just mail destined to or originating from known users.
Term
E-mail spoofing
Definition
Activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source. Since SMTP does not provide any authentication, it is easy to impersonate and forge e-mails.
Term
Sender Policy Framework (SPF)
Definition
An e-mail validation system designed to prevent e-mail spam by detecting e-mail spoofing, a common vulnerability, by verifying sender IP addresses.
Term
Phishing
Definition
A way of attempting to obtain data such as usernames, passwords, credit card information, and other sensitive data by masquerading as an authenticated entity in an electronic communication. Spear phishing targets individuals, and whaling targets people with high authorization (CEO, COO, CIO).
Term
Network address translation (NAT)
Definition
The process of modifying IP address information in packet headers while in transit across a traffic routing device, with the goal of reducing the demand for public IP addresses.
Term
Autonomous system (AS)
Definition
A collection of connected IP routing prefixes under the control of one or more network operators that presents a common, clearly defined routing policy to the Internet. They are uniquely identified as individual networks on the Internet.
Term
Distance-vector routing protocol
Definition
A routing protocol that calculates paths based on the distance (or number of hops) and a vector (a direction).
Term
Link-state routing protocol
Definition
A routing protocol used in packetswitching networks where each router constructs a map of the connectivity within the network and calculates the best logical paths, which form its routing table.
Term
Border Gateway Protocol (BGP)
Definition
The protocol that carries out core routing decisions on the Internet. It maintains a table of IP networks, or “prefixes,” which designate network reachability among autonomous systems (ASs).
Term
Wormhole attack
Definition
This takes place when an attacker captures packets at one location in the network and tunnels them to another location in the network for a second attacker to use against a target system.
Term
Spanning Tree Protocol (STP)
Definition
A network protocol that ensures a loop-free topology for any bridged Ethernet LAN and allows redundant links to be available in case connection links go down.
Term
Source routing
Definition
Allows a sender of a packet to specify the route the packet takes through the network versus routers determining the path.
Term
Multiprotocol Label Switching (MPLS)
Definition
A networking technology that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table.
Term
Virtual local area network (VLAN)
Definition
A group of hosts that communicate as if they were attached to the same broadcast domain, regardless of their physical location. VLAN membership can be configured through software instead of physically relocating devices or connections, which allows for easier centralized management.
Term
VLAN hopping
Definition
An exploit that allows an attacker on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.
Term
Private Branch Exchange (PBX)
Definition
A telephone exchange that serves a particular business, makes connections among the internal telephones, and connects them to the public-switched telephone network (PSTN) via trunk lines.
Term
Bastion host
Definition
A highly exposed device that will most likely be targeted for attacks, and thus should be properly locked down.
Term
Dual-homed firewall
Definition
This device has two interfaces and sits between an untrusted network and trusted network to provide secure access. A multihomed device just means it has multiple interfaces. Firewalls that have multiple interfaces allow for networks to be segmented based upon security zone, with unique security configurations.
Term
Screened host
Definition
A firewall that communicates directly with a perimeter router and the internal network. The router carries out filtering activities on the traffic before it reaches the firewall.
Term
Screened subnet architecture
Definition
When two filtering devices are used to create a DMZ. The external device screens the traffic entering the DMZ network, and the internal filtering device screens the traffic before it enters the internal network.
Term
Virtual firewall
Definition
A firewall that runs within a virtualized environment and monitors and controls traffic as it passes through virtual machines. The firewall can be a traditional firewall running within a guest virtual machine or a component of a hypervisor.
Term
Proxy server
Definition
A system that acts as an intermediary for requests from clients seeking resources from other sources. A client connects to the proxy server, requesting some service, and the proxy server evaluates the request according to its filtering rules and makes the connection on behalf of the client. Proxies can be open or carry out forwarding or reverse forwarding capabilities.
Term
Honeypots
Definition
Systems that entice with the goal of protecting critical production systems. If two or more honeypots are used together, this is considered a honeynet.
Term
Network convergence
Definition
The combining of server, storage, and network capabilities into a single framework, which decreases the costs and complexity of data centers. Converged infrastructures provide the ability to pool resources, automate resource provisioning, and increase and decrease processing capacity quickly to meet the needs of dynamic computing workloads.
Term
Cloud computing
Definition
The delivery of computer processing capabilities as a service rather than as a product, whereby shared resources, software, and information are provided to end users as a utility. Offerings are usually bundled as an infrastructure, platform, or software.
Term
Electronic data interchange (EDI)
Definition
The structured transmission of data between organizations. It is considered to describe the rigorously standardized format of electronic documents and commonly used in supply chains between customers, vendors, and suppliers.
Term
Value-added network (VAN)
Definition
A hosted EDI service offering that acts as an intermediary between business partners sharing standards-based or proprietary data via shared business processes.
Term
Metropolitan area network (MAN)
Definition
A network that usually spans a city or a large campus, interconnects a number of LANs using a highcapacity backbone technology, and provides up-link services to WANs or the Internet.
Term
Synchronous Optical Networking (SONET) and Synchronous Digital Hierarchy (SDH)
Definition
Standardized multiplexing protocols that transfer multiple digital bit streams over optical fiber and allow for simultaneous transportation of many different circuits of differing origin within a single framing protocol.
Term
Metro Ethernet
Definition
A data link technology that is used as a metropolitan area network to connect customer networks to larger service networks or the Internet. Businesses can also use Metro Ethernet to connect distributed locations to their intranet.
Term
Wide area network (WAN)
Definition
A telecommunication network that covers a broad area and allows a business to effectively carry out its daily function, regardless of location.
Term
Multiplexing
Definition
A method of combining multiple channels of data over a single transmission line.
Term
T-carriers
Definition
Dedicated lines that can carry voice and data information over trunk lines. It is a general term for any of several digitally multiplexed telecommunications carrier systems.
Term
Time-division multiplexing (TDM)
Definition
A type of multiplexing in which two or more bit streams or signals are transferred apparently simultaneously as subchannels in one communication channel, but are physically taking turns on the single channel.
Term
Wave-division multiplexing (WDM)
Definition
Multiplying the available capacity of optical fibers through use of parallel channels, with each channel on a dedicated wavelength of light. The bandwidth of an optical fiber can be divided into as many as 160 channels.
Term
Frequency-division multiplexing (FDM)
Definition
Dividing available bandwidth into a series of nonoverlapping frequency sub-bands that are then assigned to each communicating source and user pair. FDM is inherently an analog technology.
Term
Statistical time-division multiplexing (STDM)
Definition
Transmitting several types of data simultaneously across a single transmission line. STDM technologies analyze statistics related to the typical workload of each input device and make real-time decisions on how much time each device should be allocated for data transmission.
Term
Channel Service Unit (CSU)
Definition
A line bridging device for use with T-carriers, and that is required by PSTN providers at digital interfaces that terminate in a Data Service Unit (DSU) on the customer side. The DSU is a piece of telecommunications circuit terminating equipment that transforms digital data between telephone company lines and local equipment.
Term
Public-switched telephone network (PSTN)
Definition
The public circuit switched telephone network, which is made up of telephone lines, fiber-optic cables, cellular networks, communications satellites, and undersea telephone cables and allows all phone-to-phone communication. It was a fixed-line analog telephone system, but is now almost entirely digital and includes mobile as well as fixed telephones.
Term
Voice over IP (VoIP)
Definition
The set of protocols, technologies, methodologies, and transmission techniques involved in the delivery of voice data and multimedia sessions over IP-based networks.
Term
Session Initiation Protocol (SIP)
Definition
The signaling protocol widely used for controlling communication, as in voice and video calls over IPbased networks.
Term
Vishing
Definition
(voice and phishing) Social engineering activity over the telephone system, most often using features facilitated by VoIP, to gain unauthorized access to sensitive data.
Term
H.323
Definition
A standard that addresses call signaling and control, multimedia transport and control, and bandwidth control for point-to-point and multipoint conferences.
Term
Real-time Transport Protocol (RTP)
Definition
Used to transmit audio and video over IP-based networks. It is used in conjunction with the RTCP. RTP transmits the media data, and RTCP is used to monitor transmission statistics and QoS, and aids synchronization of multiple data streams.
Term
War dialing
Definition
When a specialized program is used to automatically scan a list of telephone numbers to search for computers for the purposes of exploitation and hacking.
Term
Integrated Services Digital Network (ISDN)
Definition
A circuit-switched telephone network system technology designed to allow digital transmission of voice and data over ordinary telephone copper wires.
Term
Digital Subscriber Line (DSL)
Definition
A set of technologies that provide Internet access by transmitting digital data over the wires of a local telephone network. DSL is used to digitize the “last mile” and provide fast Internet connectivity.
Term
Cable modem
Definition
A device that provides bidirectional data communication via radio frequency channels on cable TV infrastructures. Cable modems are primarily used to deliver broadband Internet access to homes.
Supporting users have an ad free experience!