Term
|
Definition
| a standard set of rules that determines how computers communicate with each other across networks despite their differences (PC, UNIC, Mac..) |
|
|
Term
|
Definition
Shows how communication should take place. -Clarify the general functions of a communication process -To break down complex networking processes into more manageable sublayers -Using industry-standard interfaces enables interoperability -To change the features of one layer without changing all of the code in every layer -Easier troubleshooting |
|
|
Term
| OSI – Open Systems Interconnect Model |
|
Definition
Layer 7 - Application Layer 6 - Presentation Layer 5 - Session Layer 4 - Transport Layer 3 - Network Layer 2 - Data Link Layer 1 - Physical |
|
|
Term
|
Definition
| Responsible for the physical transmission of the binary digits through the physical medium. This layer includes things such as the physical cables, interfaces, and data rate specifications. User information maintained at this layer is called bits (the 1s and 0s). Layer 1 |
|
|
Term
|
Definition
| Responsible for the physical addressing of the network via MAC addresses. Ther are two sublevels to the Data-Link layer. MAC and LLC. The Data-Link layer has error detection, frame ordering, and flow control. User information maintained at this layer is called frames. Layer 2. |
|
|
Term
|
Definition
| Responsible for the routing of user data from one node to another through the network including the path selection. Logical addresses are used at this layer. User information maintained at this layer is called packets. |
|
|
Term
|
Definition
| Responsible for the guaranteed delivery of user information. It is also responsible for error detection, correction, and flow control. User information at this layer is called datagrams. |
|
|
Term
|
Definition
| Responsible for the setup of the links, maintaining of the link, and the link tear-down between applications. Layer 5 |
|
|
Term
|
Definition
| Responsible for the formatting of the data so that it is suitable for presentation. Responsible for character conversion (ASCII/EBCDIC), Encryption/Decryption, Compression, and Virtual Terminal Emulation. User information maintained at this layer is called messages. Layer 6 |
|
|
Term
|
Definition
| Responsible for all application-to-application communications. User information maintained at this layer is user data. Layer 7 |
|
|
Term
|
Definition
| FTP, SMB, TELNET, TFTP, SMTP, HTTP, NNTP, CDP, GOPHER, SNMP, NDS, AFP, SAP, NCP, SET |
|
|
Term
|
Definition
| Application - provides confidentiality, authentication, data integrity, non-repudiation. |
|
|
Term
|
Definition
| ASCII, EBCDIC, POSTSCRIPT, JPEG, MPEG, GIF |
|
|
Term
|
Definition
| Presentation - provides confidentiality, authentication, encryption |
|
|
Term
|
Definition
| Remote Procedure Calls (RPC) and SQL, RADIUS, DNS, ASP |
|
|
Term
|
Definition
| Session - provides no security |
|
|
Term
|
Definition
| TCP, UDP, SSL, SSH-2, SPX, NetBios, ATP |
|
|
Term
|
Definition
| Transport - provides confidentiality, authentication, integrity |
|
|
Term
|
Definition
| IP, IPX, ICMP, OSPF, IGRP, EIGRP, RIP, BOOTP, DHCP, ISIS, ZIP, DDP, X.25 |
|
|
Term
|
Definition
| Network - provides confidentiality, authentication, data integrity |
|
|
Term
|
Definition
| L2F, PPTP, L2TP, PPP, SLIP, ARP, RARP, SLARP, IARP, SNAP, BAP, CHAP, LCP, LZS, MLP, Frame Relay, Annex A, Annex D, HDLC, BPDU, LAPD, ISL, MAC, Ethernet, Token Ring, FDDI |
|
|
Term
|
Definition
| Data link provides confidentiality |
|
|
Term
|
Definition
| 10BaseT, 100BaseT, 1000BaseT, 10Base2, 10Base5, OC-3, OC-12, DS1, DS3, E1, E3, ATM, BRI, PRI, X.23 |
|
|
Term
|
Definition
| Physical - provides confidentiality |
|
|
Term
|
Definition
| Process in which information from one packet is wrapped around or attached to the data of another packet. In OSI model each layer encapsulates the layer immediately above it. |
|
|
Term
|
Definition
| Collection of security mechanisms, files, and procedures that help protect the network. |
|
|
Term
|
Definition
-Authentication -Access control -Data confidentiality -Data integrity -Non-repudiation -Logging and monitoring |
|
|
Term
|
Definition
-Encipherment -Digital signature -Access Control -Data Integrity -Authentication -Traffic Padding -Routing Control -Notarization |
|
|
Term
|
Definition
-Application Layer -Host to Host Layer -Internet Layer -Network Access Layer |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Consists of routines for accessing physical networks and the electrical connection. Layer 1 of the TCP/IP model |
|
|
Term
|
Definition
| Defines the IP datagram and handles the routing of data across networks. Layer 2 of the TCP/IP model |
|
|
Term
|
Definition
| Provides end-to-end data delivery service to the Application Layer. Layer 3 of the TCP/IP model |
|
|
Term
|
Definition
| Consists of the applications and processes that use the network. Layer 4 of the TCP/IP model |
|
|
Term
| TCP – Transmission Control Protocol |
|
Definition
-Connection Oriented -Sequenced Packets -Acknowledgment is sent back for received packets -If no acknowledgement then packet is resent -Packets are re-sequenced -Manageable data flow is maintained |
|
|
Term
| User Datagram Protocol (UDP) |
|
Definition
-Best effort -Doesn’t care about sequence order -Connectionless -Less overhead and faster than TCP |
|
|
Term
|
Definition
Internet Layer Protocol -All hosts on a network have an IP address -Each data packet is assigned the IP address of the sender and receiver -It provides an ‘unreliable datagram service’. Provides: -No guarantees that the packet will be delivered -No guarantee that the packet will be delivered only once -No guarantee that it will be delivered in the order which it was sent |
|
|
Term
| ARP – Address Resolution Protocol |
|
Definition
Internet Layer Protocol -Use the IP Address to get the MAC Address -MAC address is 48 bit -IP address is 32 bit -Only broadcast to network first time, otherwise stores IP and MAC info in table |
|
|
Term
| RARP – Reverse Address Resolution Protocol |
|
Definition
Internet Layer protocol. -Use the MAC Address to get the IP Address -RARP Server tells diskless machines IP Address |
|
|
Term
| ICMP – Internet Control Message Protocol |
|
Definition
Internet Layer Protocol -Management Protocol and messaging service provider for IP. -Sends messages between network devices regarding the health of the network. -Ping is ICMP packet -Ping checks if a host is up and operational |
|
|
Term
|
Definition
-Telnet – Terminal Emulation (No File Transfer) -FTP – File Transfer Protocol – (Can not execute files) -TFTP – Trivial FTP – no directory browsing capabilities, no authentication (it is unsecure), can only send and receive files. -Some sites choose not to implement TFTP due to the inherent security risks. -TFTP is an UDP-based file transfer program that provides no security. -NFS – Network File Sharing -SMTP – Delivers emails -LDP – Line Printer Daemon – with LPR enables print spooling -X-Windows – for writing graphical interface application -SNMP – Simple Network Management Protocol. Provides for the collection of network information by polling the devices on the network from a management station. Sends SNMP traps (notification) to MIBS Management Information Bases -Bootstrap (BootP) protocol – Diskless boot up. BootP server hears the request and looks up the client’s MAC address in its BootP file. It’s an internet layer protocol. |
|
|
Term
| SET – Secure Electronic Transaction |
|
Definition
-Originated by Visa and MasterCard -Being overtaken by SSL |
|
|
Term
|
Definition
-Early standard for encrypting HTTP documents -Also being overtaken by SSL |
|
|
Term
|
Definition
-SSH has RSA Certificates -Supports authentication, compression, confidentiality, and integrity -DES Encryption -Because Secure Shell (SSH-2) supports authentication, compression, confidentiality, and integrity, SSH is used frequently for Encrypted File Transfer |
|
|
Term
| SSL – Secure Socket Layer |
|
Definition
-Contains SSL record protocol and SSL Handshake Protocol -Uses symmetric encryption and public key for authentication -MAC – Message Authentication Code for Integrity |
|
|
Term
| SKIP – Simple Key Management for Internet Protocol |
|
Definition
| Similar to SSL – no prior communication required |
|
|
Term
| Packet Filtering Firewall |
|
Definition
First Generation -Screening Router -Operates at Network and Transport level -Examines Source and Destination IP Address -Can deny based on ACLs -Can specify Port |
|
|
Term
| Application Level Firewall |
|
Definition
Second Generation -Proxy Server -Copies each packet from one network to the other -Masks the origin of the data -Operates at layer 7 (Application Layer) -Reduces Network performance since it has do analyze each packet and decide what to do with it. -Also Called Application Layer Gateway |
|
|
Term
| Stateful Inspection Firewalls |
|
Definition
Third Generation -Packets Analyzed at all OSI layers -Queued at the network level -Faster than Application level Gateway |
|
|
Term
| Dynamic Packet Filtering Firewalls |
|
Definition
-Allows modification of security rules -Mostly used for UDP -Remembers all of the UDP packets that have crossed the network’s perimeter, and it decides whether to enable packets to pass through the firewall |
|
|
Term
|
Definition
-Runs in NT Kernel -Uses dynamic and custom TCP/IP-based stacks to inspect the network packets and to enforce security policies. |
|
|
Term
|
Definition
-Sits between trusted and untrusted networks -Uses ACLs -ACLs can be manually intensive to maintain -Lacks strong user authentication -ACLs can degrade performance -Minimal Auditing |
|
|
Term
|
Definition
-Employs packet filtering and Bastion Host -Provides network layer (packet filtering) and application layer (proxy) services -Penetration requires getting by external router (packet filtering) and Bastion Host (proxy). |
|
|
Term
|
Definition
-Contains two NICs -One connected to the local “trusted” network -One connected to the external “untrusted” network -Blocks or filters traffic between the two. -IP forwarding is disabled |
|
|
Term
|
Definition
-One of the most secure -Two packet filtering routers and a Bastion Host -Provides network layer (packet filtering) and application layer (proxy) services -Provides DMZ -Complex configuration |
|
|
Term
|
Definition
-Circuit level proxy server -Requires SOCKS client on all machines -Used to manage outbound Internet access -IT Overhead intensive |
|
|
Term
|
Definition
| 10.0.0.0 to 10.255.255.255 |
|
|
Term
|
Definition
| 172.16.0.0 to 172.31.255.255 |
|
|
Term
|
Definition
| 192.168.0.0 to 192.168.255.255 |
|
|
Term
| Large networks with many devices. 1-127 |
|
Definition
|
|
Term
| Medium-sized networks. 128-191 |
|
Definition
|
|
Term
| Small networks (fewer than 256 devices). 192-223 |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
-Secure connection between two nodes using secret encapsulation method. -Secure Encrypted Tunnel – encapsulated tunnel (encryption may or may not be used) |
|
|
Term
| 3 methods to create a Tunnel |
|
Definition
-Installing software or agents on client or network gateway. -Implementing user or node authentication systems. -Implementing key and certificate exchange systems. |
|
|
Term
| PPTP – Point-to-Point Tunneling Protocol |
|
Definition
-Works at the Data Link Layer -Single point to point connection from client to server -Common with asynchronous connections with NT and Win 95 |
|
|
Term
| L2TP - Layer 2 Tunneling Protocol |
|
Definition
-Combination of PPTP and earlier Layer 2 Forwarding Protocol (L2F) -Multiple protocols can be encapsulated within the L2TP -Single point to point connection from client to server -Common with Dial up VPNs |
|
|
Term
|
Definition
-Operates at the network layer -Allows multiple and simultaneous tunnels -Encrypt and authenticate IP data -Focuses more on Network to Network Connectivity |
|
|
Term
|
Definition
| Entire packet is encrypted and encases in IPSec packet |
|
|
Term
|
Definition
| Only datagram is encrypted leaving IP address visible. |
|
|
Term
|
Definition
| A self-contained, independent entity of data carrying sufficient information to be routed from the source to the destination. |
|
|
Term
|
Definition
-Hardware and Software devices that utilize VPN Standards -Two types: IPSec Compatible and Non-IPSec Compatible |
|
|
Term
| IPSec Compatible VPN Devices |
|
Definition
-Installed on a networks perimeter and encrypt traffic between the two -Because IPSec only work with IP -Operate at Network Layer -Operate in Tunnel or Transport Mode |
|
|
Term
| Non-IPSec Compatible VPN Devices |
|
Definition
|
|
Term
|
Definition
| Not a traditional VPN protocol but is robust and operates at Application Layer. |
|
|
Term
|
Definition
Implemented in Win95 and NT -Multiprotocol and uses PAP and CHAP user authentication. -Compresses Data -End-to-End encryption |
|
|
Term
|
Definition
| Not strictly a VPN but can be used as one with Terminal Session |
|
|
Term
|
Definition
-Frequently available with Third Generation (Stateful Inspection) Firewalls -Operate at the Application layer -Performance degradation is often a problem |
|
|
Term
|
Definition
-Local Area Network (LAN) -Wide Area Network (WAN) -Internet -Intranet -Extranet |
|
|
Term
| Local Area Networks – LAN |
|
Definition
| Discrete network for limited geographical area like a building or a single floor |
|
|
Term
| CAN - Campus Area Network |
|
Definition
| Connects multiple buildings with each other over switched backbone |
|
|
Term
| MAN – Metropolitan Area Network |
|
Definition
| LAN over a city wide metropolitan area. |
|
|
Term
|
Definition
-Network of sub networks that interconnect LANs over large geographic areas. -WAN is basically everything outside of LAN |
|
|
Term
|
Definition
-Internet like logical network that uses a companies internal physical network structure -More security and control than Internet -Uses Internet tools like browsers. |
|
|
Term
|
Definition
-Extranet can be accessed by users outside of the company, (i.e. vendors and partners) but not the general public. -Includes some type of authentication or encryption |
|
|
Term
|
Definition
| Basis of modems and dial up remote access. Must operate at same speed. |
|
|
Term
|
Definition
| Very high speed, governed by electronic clock timing signals |
|
|
Term
| Common Data Network services |
|
Definition
-File Services -Mail Services -Print Services -Client/Server Services -Domain Name Services |
|
|
Term
|
Definition
| Matches Internet Uniform Resource Locator (URL) with the actual IP address of the server providing the URL. Maps host names to IP Addresses. IT is a global network of servers that provide this service. |
|
|
Term
|
Definition
| Allocate computing resources among workstations |
|
|
Term
|
Definition
| send and receive mail internally and externally |
|
|
Term
|
Definition
| Share data files and subdirectories on file server |
|
|
Term
|
Definition
-Static routing -Distance Vector Routing -Link State |
|
|
Term
|
Definition
-uses only first hand information when building tables by maintaining every other router's Link State Protocol (LSP) Frame -Open Shortest Path First (OPSF) protocol features least-cost routing, multipath routing, and load balancing |
|
|
Term
|
Definition
-Routing Information Protocol(RIP)used to maintian dynamic routing tables -Best routing path determination by the fewest hops |
|
|
Term
|
Definition
-Specific route definitions -No need for routers to exchange information dynamically |
|
|
Term
| Spanning Tree Protocol (STP) |
|
Definition
Developed by Digtial Equipment Corporation (DEC)is now the IEEE 802.1d standard -Uses Spanning tree algorith (STA) to identify the best path to communicatie with a node and any alternative paths |
|
|
Term
|
Definition
| Allows a switch to learn information about the location of nodes on the network |
|
|
Term
| Steps of Transparent Bridging |
|
Definition
-learning -flooding -filtering -forwarding -aging |
|
|
Term
|
Definition
-Virsus -Spware -Trojan Horses -Remote Access Trojans (RATS) -Logic Bomb -Worms |
|
|
Term
|
Definition
-Macro Viruses -Polymorphic Viruses -Stealth Viruses |
|
|
Term
|
Definition
|
|
Term
| Remote Access Trojans (RATs) |
|
Definition
| Program that allows access to a computer's resources without the owners knowledge |
|
|
Term
|
Definition
-Sobig -IloveYou -MyDoom -Sasser |
|
|
Term
|
Definition
| Any technology that aids in gathering information about a person or organization without their knowledge or consent |
|
|