Term
What is meant by Cloud file synch/ distribution? |
|
Definition
It means that a powerpoint or any file can be acessed from any device ( home tablet, home desktop, office labtop, etc) |
|
|
Term
Why is the cloud, called the cloud? ( What does the imagery represent? |
|
Definition
That the user foes not have to understand how systems "inside the cloud" operate. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Relative signal strength, higher the better |
|
|
Term
What would a BSSID number look like? |
|
Definition
|
|
Term
What would a signal look like? |
|
Definition
|
|
Term
What would a mode number look like? |
|
Definition
|
|
Term
Was would an encryption code look like? |
|
Definition
|
|
Term
What would an authenticitation number look like? |
|
Definition
|
|
Term
|
Definition
A network is a system that permits networked applications running on different hosts to work together. |
|
|
Term
|
Definition
The network core is depicted as a cloud to emphasize that users do not have to know what goes on inside the network core. |
|
|
Term
What connects hosts to the network? |
|
Definition
|
|
Term
Any device attached to a network is a ____. |
|
Definition
|
|
Term
What are some examples of a host? |
|
Definition
large servers, small desktops, laptops, netbooks, smart phones, and tablets. |
|
|
Term
How do hosts communicate? |
|
Definition
By sending messages addressed to the destination host. |
|
|
Term
The client program sends a _____ message, and the server program sends a ______ message. |
|
Definition
The client program sends a request message, and the server sends a response message. |
|
|
Term
The client and the server share |
|
Definition
|
|
Term
This type of processing can be done without a network or with a network. No servers are needed. |
|
Definition
|
|
Term
what does bps stand for? What is the hierachy in transmission speed? |
|
Definition
Bits per second kbps = 1000 bps Gbps = 1000 Mbps Tbps = 1000 Gbps |
|
|
Term
|
Definition
Means it is fairly constant use. Paying by the minute is fairly efficient. |
|
|
Term
What is meant by data burstiness? |
|
Definition
In a two way transmission , one side is transmitting, and the other is not. |
|
|
Term
|
Definition
Short bursts of data, with long silences needed. High speeds needed. |
|
|
Term
What is meant by packet switching and multiplexing? |
|
Definition
1.) Original message is fragmented into packets on the source host. 2.) Packets are sent individually through the network. 3.) If a packet is lost, only that packet needs to be resent, not the entire application message. |
|
|
Term
Packets of different conversations are ________ , reducing the cost per conversation. |
|
Definition
|
|
Term
What is meant by sequential switching decisions? |
|
Definition
When packet switch A receives a packet addressed to Destination Host Y. It must make a forwarding decision, which means sending the packet to switch B or C. |
|
|
Term
True or false: A packet switch does not know the packets entire path through the network, it only knows the next step. |
|
Definition
|
|
Term
How do switches make decisions on where to send the packet? |
|
Definition
It is based on the switching table. |
|
|
Term
What do physical links do? |
|
Definition
They connect adjacent devices. |
|
|
Term
|
Definition
The data link is the packets entire path through the network. |
|
|
Term
What was the forerunner of the internet? |
|
Definition
|
|
Term
How was the internet birthed? |
|
Definition
Bob Kahn needed a way for researchers on one network to use resources on another network. Packets would have to travel across multiple networks. Kahn came up with the idea of connecting multiple networks by devices called routers. |
|
|
Term
|
Definition
They connect single networks into an internet |
|
|
Term
What is the different between Single networks and Internets based on what packets are called, what packet switches are called, and what end to end routes are as well as addresses? |
|
Definition
The single network address varies by network technology, packets are called frames, packet switches are called switches, and end to end routes are called data links.
Internets addresses are 32 bit IPv4 addresses and 128 bit IPv6 addresses. Packets are called packets, packet switches are called routers, and end to end routes are called routes. |
|
|
Term
In an internet, a single packet goes all the way from the ____ host to the ______ host. |
|
Definition
|
|
Term
In each single network along the way, a ____ is carried in a different ____. |
|
Definition
|
|
Term
|
Definition
The packet's path through the network. Example X-A-B-D-F-Y |
|
|
Term
What is the NWG( Network working group)? |
|
Definition
- Formed by students to create standards for the ARPANET - Called their standards RFCs - NWG evolved into today's standards body for the internet. - Internet standards today are still called RFC's |
|
|
Term
|
Definition
a packets path through the internet. |
|
|
Term
What is meant by the transport layer? |
|
Definition
-End to End ( host to host) - Packet assembly and disassemby with TCP - Error correction, packet sequencing, and congestion control with TCP |
|
|
Term
What are the five networking layers, in order? |
|
Definition
5) application 4) Transport 3) Internet 2) Data link 1) physical |
|
|
Term
|
Definition
Internet layer protocol - Unreliable best-effort internet layer operation. |
|
|
Term
|
Definition
- Transport layer protocol - TCP messages are called segments - Provides transport layer functionality to fix problems. - error correction, and so on. |
|
|
Term
|
Definition
- The other transport layer protocol - Messages are called datagrams - Unreliable, so used when reliability is not desired. |
|
|
Term
|
Definition
Internet service provider. To use the internet you need an ISP and an access line to your ISP. Your USP gives you access and carries your packets. |
|
|
Term
|
Definition
ISPS collectively comprise the internet backbone. They interconnect at network access points ( NAPs) to exchange packets. |
|
|
Term
What are some standards for delivery packets? |
|
Definition
|
|
Term
TCP/IP also has supervisory protocols. What do they do? |
|
Definition
- To handle things beyond packet delivery. - Managing IP addresses - error handling, and so on - e.g. DHCP and DNS |
|
|
Term
What is an example of a DHCP request message between a client PC that needs a dynamic IP address, and a DHCP server? |
|
Definition
DHCP request message: My network address is F102A. Please give me a 32 bit IP address. |
|
|
Term
What is an example of a DHCP response message? ( From DHCP server to Client PC) |
|
Definition
"Your 32 bit IP address is... here is additional configuration information. The IP address of your default router, the IP addresses of your DNS servers. |
|
|
Term
What does the DNS first must do? |
|
Definition
The originating host wants to send packets to a website, it must learn their IP address to send it packets. |
|
|
Term
What is an example of a DNS request message? |
|
Definition
"the host name for this website is 128.171.17.13 |
|
|
Term
What does the wireless access router do? |
|
Definition
The IP gives the home on IP address. The home network has multiple devices that need IP addresses. |
|
|
Term
What does the access router DHCP circuit do? |
|
Definition
it gives private IP addresses to other devices. |
|
|
Term
What does NAT allow things to do? |
|
Definition
It allows multiple internal hosts to share a single external IP address. External sniffers cannot learn internal addresses. |
|
|
Term
What are the five layers of the internet? |
|
Definition
Application, Transport, Internet, Data Link, Physical. |
|
|
Term
|
Definition
Standards allow different systems to work together. |
|
|
Term
What does the term standard also mean? |
|
Definition
|
|
Term
What do network standards do? |
|
Definition
Govern message semantics, syntax, order, reliability, and format. They also permit interoperability among vendors. It also creates competition Encourages growth in functionality. |
|
|
Term
A data link is the path from the ___ to the ____. And the Route is the path from the ____ to the _____. |
|
Definition
data link: host to router. Route: From source host , through the router, to the destination host. |
|
|
Term
What are the broad functions of the layers? |
|
Definition
Application- Interoperability of application programs Transport/ internet - transmission across an internet. Data Link/ Physical - Transmission across a single switched or wireless network. |
|
|
Term
What are network standards? |
|
Definition
rules that govern the exchange of messages between hardware or software processes on different hosts, including messages, reliability, and connection orientation. |
|
|
Term
What are some important points about the message order? |
|
Definition
- They take turns ( think of telephone conversations) - Order of messages in a complex transaction. - Who must initiate communication, and so on. |
|
|
Term
What is meant by reliable? |
|
Definition
- A reliable protocol both detects and corrects errors during transmission. - error detection alone is not enough - some unreliable protocols detect errors but then only drop incorrect messages. |
|
|
Term
What is the message order in HTTP? |
|
Definition
in http, the client program initiates the communication by sending an HTTP request message to the webserver program. |
|
|
Term
What happens after the client pc sends a http request message? |
|
Definition
the webserver program sends an http response message back. The webserver program may not transmit until it receives an http request message. |
|
|
Term
|
Definition
connectionless. Every request response cycle is independent. |
|
|
Term
|
Definition
connection oriented. - there is a formal opening of the connection. - Within the connection, messages are sequenced, acknowledged, and retransmitted if necessary. - there is a formal closing of the connection. |
|
|
Term
A connection opening requires ____ segments. |
|
Definition
three. - SYN request - SYN/ ACK - ACK |
|
|
Term
What is the order of an http request? |
|
Definition
HTTP request, ACK, Data = http response, ACK |
|
|
Term
What happens to HTTP requests that are unacknowledged? |
|
Definition
|
|
Term
How many messages close a connection? |
|
Definition
four -> FIN , <---Ack, <--- Data, ----> ACK, <---- FIN, --->ACK |
|
|
Term
What does semantics mean? |
|
Definition
the meaning of a message. |
|
|
Term
What are the semantics behinds an http request message, http response message, http get request, and http put request? |
|
Definition
http request- please give me this file. http response - here is the file, or i could not comply for the following reason. http get- please give me this file http put- store this file. |
|
|
Term
In general, messages have what three parts? |
|
Definition
trailer, data field, and header. |
|
|
Term
What does the data field, header, and trailer contain? |
|
Definition
- the data field contains the content being delivered. - the header is everything before the data field. the trailer is everything after the data field. |
|
|
Term
|
Definition
- broken into smaller segments called header fields. - there is often an address field to indicate where to deliver the message. |
|
|
Term
true or false: Most messages do not have trailers. |
|
Definition
|
|
Term
Field lengths may be measured in ___ or ___. |
|
Definition
bits or bytes. Another name for a byte is octet. |
|
|
Term
True or false: Some messages do not have data fields. |
|
Definition
true. Example: Some TCP SYN segments only have headers. |
|
|
Term
|
Definition
Dominant version of IP on the internet today - 32 bit IP addresses - more than 4 billion possible addresses. - handed out inefficiently, few available. |
|
|
Term
|
Definition
128 bit addresses should give an inexhaustible supply - new syntax for ip packets. |
|
|
Term
What does the sequence number field give? |
|
Definition
the TCP segment's order in the session. |
|
|
Term
What does the acknowledgement number field indicate? |
|
Definition
indicates the segment that this segment is acknowledging. |
|
|
Term
|
Definition
1 bit fields. If the value is one, the flag field is set. If the flag field is 0, the flag field is not set. Flag bits are SYN, ACK, FIN and RST/ TCP has six flag fields. |
|
|
Term
What is the TCP checksum field? |
|
Definition
for error correction. - The sender computes the value in the field. - If the receiver computes the same value, it sends an ACK. - If not, the receiver discards the segment and sends nothing. the sender will resend the segment. TCP is reliable. |
|
|
Term
|
Definition
- the always have headers - some TCP segments do not have data fields. - some TCP segments do not have data fields. - Supervisory segments do not carry data because the information to be conveyed delivers no data. - TCP segments NEVER have trailers. |
|
|
Term
|
Definition
IP's have headers, a data field, but never have a trailer. |
|
|
Term
What is the UDP checksum? |
|
Definition
the udp checksum is for error detection. If there is an error, udp discards the datagram. - if no error is detected, it accepts the datagram but does not send the ACK. |
|
|
Term
Both TCP and UDP headers begin with a ____ port number and a _____ port number field. |
|
Definition
|
|
Term
What type of port numbers do SMTP, HTTP, and FTP applications have? |
|
Definition
SMTP- port 25 HTTP - Port 80 FTP- Ports 20 and 21 - each app is assigned a port number |
|
|
Term
Major applications usually are given well known port numbers ranging from : |
|
Definition
|
|
Term
What does the second line of a Http get request specify? |
|
Definition
it specifies to the host to receive this http request message. |
|
|
Term
|
Definition
- Applications must convert application message into bits. - this is necessary because all lower layers have fields consisting only of ones and zeros. - this is called encoding. |
|
|
Term
From the source host, what is the order of a message sent through one cliet, to a host? |
|
Definition
1.) Encapsulation of http message in a data field of TCP segment. 2.) Encapsulation of TCP segment in data field of an IP packet ( internet layer ). 3.) Encapsulation of IP packet in data field of ethernet frame. 4.) Conversion of bits into outgoing signals. |
|
|
Term
What are the two major standard architectures? |
|
Definition
|
|
Term
|
Definition
divides the internet into 7 layers ( Application, presentation, session, transport, network, data link, physical. |
|
|
Term
What is the most dominant architecture? |
|
Definition
|
|
Term
Security is primarily a _____ issue, not a ______ issue. |
|
Definition
|
|
Term
You cannot defend yourself unless you know the _____ ______ you face. |
|
Definition
|
|
Term
How do companies defend themselves? |
|
Definition
the Plan- Portect- respond cycle. |
|
|
Term
|
Definition
a general name for evil software. |
|
|
Term
What is meant by vulnerability? |
|
Definition
Vulnerabilities are securit flaws in specific programs. - specific malware requires a specific vulnerability to be effective. - Universal malware does not require a specific vulnerability to be effective. |
|
|
Term
Peices of code that attach themselves to other programs are ____. |
|
Definition
viruses. - virus code executes when an infected programs executes. The virus then infects other programs on the computer. |
|
|
Term
Stand alone programs that don't need to attach to other programs are: |
|
Definition
worms. - can propagate like viruses through email - directly propagating worms jump to victim hosts directly. |
|
|
Term
what are scripts/ mobile code? |
|
Definition
HTML web pages can contain scripts. - these are snippets of code in a simplified programming language that are executed when the webpage is in a browser. - scripts are called mobile code because they are downloaded within the webpage. |
|
|
Term
A firewall stops _____, and worms are stoped by _____ |
|
Definition
firewall stops worms, viruses are stopped by antivirus. |
|
|
Term
What are three attacks on individuals? |
|
Definition
Social Engineering ( tricking the victim into doing something against their interest) - Fraud ( Lying to the user to get the user to do something against his or her financial self interest) Spam ( unsolicited commercial email, often used for fraud) |
|
|
Term
What are two other attacks on individuals? |
|
Definition
- including a link to a website that has malware. -phishing attacks- when a legit looking website ask you for username, password, etc. |
|
|
Term
What is a human break in? |
|
Definition
Hacking - informally hacking is breaking into a computer or system. - formally, hacking is intentionally using a computer resource without authorization or in excess of authorization. |
|
|
Term
What are the stages in a human break in? |
|
Definition
-scanning phase - the break in - after the break in |
|
|
Term
|
Definition
pings that identify active IP addresses and therefore potential victims. |
|
|
Term
What does a second round probe attack do? |
|
Definition
second round send packets to ports on identified potential victims to identify applications. |
|
|
Term
What is associated with the break in? |
|
Definition
- uses an exploit- a tailored attack method that is often a program. - normally exploits a vulnerability on the victim computer. |
|
|
Term
What happens after the break in? |
|
Definition
1.) The hacker downloads a hacker tool kit to automate hacking work. 2.) The hacker becomes invisible by deleting log files. 3.) the hacker creates a computer backdorr ( way to get back into the computer ). Backdoor account - account with a known password and full priveleges. - backdoor program- program to allow reentry; usually trojanized. |
|
|
Term
|
Definition
its when an attacker sends attack commands to bots. Bots then attack victims. |
|
|
Term
What are some types of hackers? |
|
Definition
- traditional hackers ( driven by curiousity, desire for power, peer reputation. - Malware writers - it is usually not a crime to write malware - it is almost always a crime to release malware. script kiddies- use attack scripts written by experienced hackers and virus writers. disgruntled employees and ex employees - steal money and trade secrets, and sabotage systems |
|
|
Term
What is a criminal attacker? |
|
Definition
- most attackers are now criminal attackers. - attackers with traditional motives are now a small and shrinking minority. - large and complex black markets for attack programs, attacks - for - hire services, bot rentals and sales, money laundering,etc. |
|
|
Term
What are the planning principles? |
|
Definition
Risk analysis comprehensive security defense in depth minimum permissions. |
|
|
Term
|
Definition
the process of balancing threat and protection costs for individual assets. - annual cost of protection should not exceed the expected annual damage. |
|
|
Term
What is comprehensive security? |
|
Definition
- an attacker only has to find one weakness to succeed. - a firm needs to close off all avenues of attack ( comprehensive security). |
|
|
Term
What is defense in depth? |
|
Definition
- every protection breaks down sometimes. - the attacker should have to break through several lines of defense to succeed. - even if one protection breaks down, the attack will not succeed. |
|
|
Term
What are minimum permissions? |
|
Definition
- people should be given minimum permissions- the least that they need to do their jobs- so that they cannot do unauthorized things. |
|
|
Term
Planners do what? and implementers do what? |
|
Definition
planners create policies, which specify what to do, but now how to do it. implementers implement policies with local and technical expertise. |
|
|
Term
|
Definition
|
|
Term
What does the process of authentication look like? |
|
Definition
the supplicant proves its identity to the verifier by sending its credentials ( proofs of identity, password, etc) and the verifier accepts or rejects it. |
|
|
Term
What are hybrid dictionary attacks? |
|
Definition
- look for common variations of names and words. - capitalizing only the first letter, ending with a single digit, etc. Passwords that can be cracked with hybrid dictionary attacks are never adequately strong, regardless of how long they are. |
|
|
Term
Passwords should be ____ and ____ |
|
Definition
|
|
Term
reusable passwords are too ____ to be used for high security today. |
|
Definition
|
|
Term
What is meant by perspective? |
|
Definition
goal is to eliminate reusable passwords. |
|
|
Term
|
Definition
permit door access - proximity access cards do not require physical scanning. - need to control distribution and disable lost or stolen cards. |
|
|
Term
|
Definition
use body measurements to authencitate you. |
|
|
Term
|
Definition
group of protections based on mathematics. |
|
|
Term
Encryption methods are called ___, not ____ |
|
Definition
|
|
Term
The receiver decypts with the same ___ and ____ key |
|
Definition
|
|
Term
A single key is used to ____ and ____ in both directions |
|
Definition
|
|
Term
____ _____ give message authentication and message integrity. |
|
Definition
|
|
Term
|
Definition
cryptographic system standard widely used in sensitive browser-webserver communication |
|
|
Term
|
Definition
protects packets and all of their embedded contents. - automatically protects all applications |
|
|
Term
What is digital certificate authentication? |
|
Definition
- strongest form of authentication. - two components 1.) everyone has a private key only he or she knows 2.) Everyoe also has a non secret public key. |
|
|
Term
What are digital certificate authentication? |
|
Definition
components - public keys are available in unalterable digital certificates - digital certificates are provided by trusted certificate authorities. |
|
|
Term
What does the process of digital certificate authenctication look like? |
|
Definition
1.) Supplicant claims to be someone ( true party ) 2.) Calculation using supplicants private key. 3.) Certificate authority provides digital certificate of true party. 4.) Certificate contains public key of true party. |
|
|
Term
Where does the verifier get the public key of the true party? |
|
Definition
from the true party's digital certificate |
|
|