Shared Flashcard Set

Details

BUS 441
BUS 441 test 1
143
Business
Undergraduate 4
09/26/2013

Additional Business Flashcards

 


 

Cards

Term
What is meant by Cloud file synch/ distribution?
Definition
It means that a powerpoint or any file can be acessed from any device ( home tablet, home desktop, office labtop, etc)
Term
Why is the cloud, called the cloud? ( What does the imagery represent?
Definition
That the user foes not have to understand how systems "inside the cloud" operate.
Term
SSID identifies what?
Definition
the Network
Term
BSSID is the
Definition
access point address
Term
RSSI is the :
Definition
Relative signal strength, higher the better
Term
What would a BSSID number look like?
Definition
A1-B2-C3-D4-F5-F6
Term
What would a signal look like?
Definition
-85 dBm
Term
What would a mode number look like?
Definition
802.11 n
Term
Was would an encryption code look like?
Definition
AES-CCMP
Term
What would an authenticitation number look like?
Definition
WPA2/ PEAP
Term
What is a network?
Definition
A network is a system that permits networked applications running on different hosts to work together.
Term
What is a network core?
Definition
The network core is depicted as a cloud to emphasize that users do not have to know what goes on inside the network core.
Term
What connects hosts to the network?
Definition
Access links
Term
Any device attached to a network is a ____.
Definition
A host
Term
What are some examples of a host?
Definition
large servers, small desktops, laptops, netbooks, smart phones, and tablets.
Term
How do hosts communicate?
Definition
By sending messages addressed to the destination host.
Term
The client program sends a _____ message, and the server program sends a ______ message.
Definition
The client program sends a request message, and the server sends a response message.
Term
The client and the server share
Definition
processing work
Term
This type of processing can be done without a network or with a network. No servers are needed.
Definition
Peer to Peer processing
Term
what does bps stand for? What is the hierachy in transmission speed?
Definition
Bits per second
kbps = 1000 bps
Gbps = 1000 Mbps
Tbps = 1000 Gbps
Term
What is voice traffic?
Definition
Means it is fairly constant use. Paying by the minute is fairly efficient.
Term
What is meant by data burstiness?
Definition
In a two way transmission , one side is transmitting, and the other is not.
Term
What is Data Traffic?
Definition
Short bursts of data, with long silences needed. High speeds needed.
Term
What is meant by packet switching and multiplexing?
Definition
1.) Original message is fragmented into packets on the source host.
2.) Packets are sent individually through the network.
3.) If a packet is lost, only that packet needs to be resent, not the entire application message.
Term
Packets of different conversations are ________ , reducing the cost per conversation.
Definition
multiplexed.
Term
What is meant by sequential switching decisions?
Definition
When packet switch A receives a packet addressed to Destination Host Y. It must make a forwarding decision, which means sending the packet to switch B or C.
Term
True or false: A packet switch does not know the packets entire path through the network, it only knows the next step.
Definition
True.
Term
How do switches make decisions on where to send the packet?
Definition
It is based on the switching table.
Term
What do physical links do?
Definition
They connect adjacent devices.
Term
What is a data link?
Definition
The data link is the packets entire path through the network.
Term
What was the forerunner of the internet?
Definition
The ARPANET
Term
How was the internet birthed?
Definition
Bob Kahn needed a way for researchers on one network to use resources on another network.
Packets would have to travel across multiple networks.
Kahn came up with the idea of connecting multiple networks by devices called routers.
Term
What do routers do?
Definition
They connect single networks into an internet
Term
What is the different between Single networks and Internets based on what packets are called, what packet switches are called, and what end to end routes are as well as addresses?
Definition
The single network address varies by network technology, packets are called frames, packet switches are called switches, and end to end routes are called data links.

Internets addresses are 32 bit IPv4 addresses and 128 bit IPv6 addresses. Packets are called packets, packet switches are called routers, and end to end routes are called routes.
Term
In an internet, a single packet goes all the way from the ____ host to the ______ host.
Definition
Source, destination.
Term
In each single network along the way, a ____ is carried in a different ____.
Definition
packet, frame
Term
The data link is:
Definition
The packet's path through the network. Example X-A-B-D-F-Y
Term
What is the NWG( Network working group)?
Definition
- Formed by students to create standards for the ARPANET
- Called their standards RFCs
- NWG evolved into today's standards body for the internet.
- Internet standards today are still called RFC's
Term
A route is:
Definition
a packets path through the internet.
Term
What is meant by the transport layer?
Definition
-End to End ( host to host)
- Packet assembly and disassemby with TCP
- Error correction, packet sequencing, and congestion control with TCP
Term
What are the five networking layers, in order?
Definition
5) application
4) Transport
3) Internet
2) Data link
1) physical
Term
What is IP?
Definition
Internet layer protocol
- Unreliable best-effort internet layer operation.
Term
What is the TCP?
Definition
- Transport layer protocol
- TCP messages are called segments
- Provides transport layer functionality to fix problems.
- error correction, and so on.
Term
What is UDP?
Definition
- The other transport layer protocol
- Messages are called datagrams
- Unreliable, so used when reliability is not desired.
Term
What is an ISP?
Definition
Internet service provider. To use the internet you need an ISP and an access line to your ISP. Your USP gives you access and carries your packets.
Term
What do ISPs do?
Definition
ISPS collectively comprise the internet backbone. They interconnect at network access points ( NAPs) to exchange packets.
Term
What are some standards for delivery packets?
Definition
IP, TCP, UDP
Term
TCP/IP also has supervisory protocols. What do they do?
Definition
- To handle things beyond packet delivery.
- Managing IP addresses
- error handling, and so on
- e.g. DHCP and DNS
Term
What is an example of a DHCP request message between a client PC that needs a dynamic IP address, and a DHCP server?
Definition
DHCP request message: My network address is F102A. Please give me a 32 bit IP address.
Term
What is an example of a DHCP response message? ( From DHCP server to Client PC)
Definition
"Your 32 bit IP address is... here is additional configuration information. The IP address of your default router, the IP addresses of your DNS servers.
Term
What does the DNS first must do?
Definition
The originating host wants to send packets to a website, it must learn their IP address to send it packets.
Term
What is an example of a DNS request message?
Definition
"the host name for this website is 128.171.17.13
Term
What does the wireless access router do?
Definition
The IP gives the home on IP address. The home network has multiple devices that need IP addresses.
Term
What does the access router DHCP circuit do?
Definition
it gives private IP addresses to other devices.
Term
What does NAT allow things to do?
Definition
It allows multiple internal hosts to share a single external IP address. External sniffers cannot learn internal addresses.
Term
What are the five layers of the internet?
Definition
Application, Transport, Internet, Data Link, Physical.
Term
What do standards do?
Definition
Standards allow different systems to work together.
Term
What does the term standard also mean?
Definition
Protocol
Term
What do network standards do?
Definition
Govern message semantics, syntax, order, reliability, and format.
They also permit interoperability among vendors.
It also creates competition
Encourages growth in functionality.
Term
A data link is the path from the ___ to the ____. And the Route is the path from the ____ to the _____.
Definition
data link: host to router.
Route: From source host , through the router, to the destination host.
Term
What are the broad functions of the layers?
Definition
Application- Interoperability of application programs
Transport/ internet - transmission across an internet.
Data Link/ Physical - Transmission across a single switched or wireless network.
Term
What are network standards?
Definition
rules that govern the exchange of messages between hardware or software processes on different hosts, including messages, reliability, and connection orientation.
Term
What are some important points about the message order?
Definition
- They take turns ( think of telephone conversations)
- Order of messages in a complex transaction.
- Who must initiate communication, and so on.
Term
What is meant by reliable?
Definition
- A reliable protocol both detects and corrects errors during transmission.
- error detection alone is not enough
- some unreliable protocols detect errors but then only drop incorrect messages.
Term
What is the message order in HTTP?
Definition
in http, the client program initiates the communication by sending an HTTP request message to the webserver program.
Term
What happens after the client pc sends a http request message?
Definition
the webserver program sends an http response message back. The webserver program may not transmit until it receives an http request message.
Term
HTTP is ____
Definition
connectionless.
Every request response cycle is independent.
Term
TCP is ___ _____
Definition
connection oriented.
- there is a formal opening of the connection.
- Within the connection, messages are sequenced, acknowledged, and retransmitted if necessary.
- there is a formal closing of the connection.
Term
A connection opening requires ____ segments.
Definition
three.
- SYN request
- SYN/ ACK
- ACK
Term
What is the order of an http request?
Definition
HTTP request, ACK, Data = http response, ACK
Term
What happens to HTTP requests that are unacknowledged?
Definition
they are retransmitted.
Term
How many messages close a connection?
Definition
four -> FIN , <---Ack, <--- Data, ----> ACK, <---- FIN, --->ACK
Term
What does semantics mean?
Definition
the meaning of a message.
Term
What are the semantics behinds an http request message, http response message, http get request, and http put request?
Definition
http request- please give me this file.
http response - here is the file, or i could not comply for the following reason.
http get- please give me this file
http put- store this file.
Term
In general, messages have what three parts?
Definition
trailer, data field, and header.
Term
What does the data field, header, and trailer contain?
Definition
- the data field contains the content being delivered.
- the header is everything before the data field.
the trailer is everything after the data field.
Term
What is in a header?
Definition
- broken into smaller segments called header fields.
- there is often an address field to indicate where to deliver the message.
Term
true or false: Most messages do not have trailers.
Definition
true
Term
Field lengths may be measured in ___ or ___.
Definition
bits or bytes. Another name for a byte is octet.
Term
True or false: Some messages do not have data fields.
Definition
true. Example: Some TCP SYN segments only have headers.
Term
What is IPv4?
Definition
Dominant version of IP on the internet today
- 32 bit IP addresses
- more than 4 billion possible addresses.
- handed out inefficiently, few available.
Term
What is IPv6?
Definition
128 bit addresses should give an inexhaustible supply
- new syntax for ip packets.
Term
What does the sequence number field give?
Definition
the TCP segment's order in the session.
Term
What does the acknowledgement number field indicate?
Definition
indicates the segment that this segment is acknowledging.
Term
Flag fields are:
Definition
1 bit fields. If the value is one, the flag field is set. If the flag field is 0, the flag field is not set. Flag bits are SYN, ACK, FIN and RST/ TCP has six flag fields.
Term
What is the TCP checksum field?
Definition
for error correction.
- The sender computes the value in the field.
- If the receiver computes the same value, it sends an ACK.
- If not, the receiver discards the segment and sends nothing. the sender will resend the segment. TCP is reliable.
Term
TCP segments have:
Definition
- the always have headers
- some TCP segments do not have data fields.
- some TCP segments do not have data fields.
- Supervisory segments do not carry data because the information to be conveyed delivers no data.
- TCP segments NEVER have trailers.
Term
What does the IP have?
Definition
IP's have headers, a data field, but never have a trailer.
Term
What is the UDP checksum?
Definition
the udp checksum is for error detection. If there is an error, udp discards the datagram.
- if no error is detected, it accepts the datagram but does not send the ACK.
Term
Both TCP and UDP headers begin with a ____ port number and a _____ port number field.
Definition
Source, destination.
Term
What type of port numbers do SMTP, HTTP, and FTP applications have?
Definition
SMTP- port 25
HTTP - Port 80
FTP- Ports 20 and 21
- each app is assigned a port number
Term
Major applications usually are given well known port numbers ranging from :
Definition
0 to 1023.
Term
What does the second line of a Http get request specify?
Definition
it specifies to the host to receive this http request message.
Term
What does encoding do?
Definition
- Applications must convert application message into bits.
- this is necessary because all lower layers have fields consisting only of ones and zeros.
- this is called encoding.
Term
From the source host, what is the order of a message sent through one cliet, to a host?
Definition
1.) Encapsulation of http message in a data field of TCP segment.
2.) Encapsulation of TCP segment in data field of an IP packet ( internet layer ).
3.) Encapsulation of IP packet in data field of ethernet frame.
4.) Conversion of bits into outgoing signals.
Term
What are the two major standard architectures?
Definition
TCP/IP, and OSI.
Term
What does the OSI do?
Definition
divides the internet into 7 layers ( Application, presentation, session, transport, network, data link, physical.
Term
What is the most dominant architecture?
Definition
TCP/IP
Term
Security is primarily a _____ issue, not a ______ issue.
Definition
management, technology.
Term
You cannot defend yourself unless you know the _____ ______ you face.
Definition
threat environment.
Term
How do companies defend themselves?
Definition
the Plan- Portect- respond cycle.
Term
What is malware?
Definition
a general name for evil software.
Term
What is meant by vulnerability?
Definition
Vulnerabilities are securit flaws in specific programs.
- specific malware requires a specific vulnerability to be effective.
- Universal malware does not require a specific vulnerability to be effective.
Term
Peices of code that attach themselves to other programs are ____.
Definition
viruses.
- virus code executes when an infected programs executes.
The virus then infects other programs on the computer.
Term
Stand alone programs that don't need to attach to other programs are:
Definition
worms.
- can propagate like viruses through email
- directly propagating worms jump to victim hosts directly.
Term
what are scripts/ mobile code?
Definition
HTML web pages can contain scripts.
- these are snippets of code in a simplified programming language that are executed when the webpage is in a browser.
- scripts are called mobile code because they are downloaded within the webpage.
Term
A firewall stops _____, and worms are stoped by _____
Definition
firewall stops worms, viruses are stopped by antivirus.
Term
What are three attacks on individuals?
Definition
Social Engineering ( tricking the victim into doing something against their interest)
- Fraud ( Lying to the user to get the user to do something against his or her financial self interest)
Spam ( unsolicited commercial email, often used for fraud)
Term
What are two other attacks on individuals?
Definition
- including a link to a website that has malware.
-phishing attacks- when a legit looking website ask you for username, password, etc.
Term
What is a human break in?
Definition
Hacking
- informally hacking is breaking into a computer or system.
- formally, hacking is intentionally using a computer resource without authorization or in excess of authorization.
Term
What are the stages in a human break in?
Definition
-scanning phase
- the break in
- after the break in
Term
What are probes?
Definition
pings that identify active IP addresses and therefore potential victims.
Term
What does a second round probe attack do?
Definition
second round send packets to ports on identified potential victims to identify applications.
Term
What is associated with the break in?
Definition
- uses an exploit- a tailored attack method that is often a program.
- normally exploits a vulnerability on the victim computer.
Term
What happens after the break in?
Definition
1.) The hacker downloads a hacker tool kit to automate hacking work.
2.) The hacker becomes invisible by deleting log files.
3.) the hacker creates a computer backdorr ( way to get back into the computer ). Backdoor account - account with a known password and full priveleges.
- backdoor program- program to allow reentry; usually trojanized.
Term
What are bots?
Definition
its when an attacker sends attack commands to bots. Bots then attack victims.
Term
What are some types of hackers?
Definition
- traditional hackers ( driven by curiousity, desire for power, peer reputation.
- Malware writers - it is usually not a crime to write malware
- it is almost always a crime to release malware.
script kiddies- use attack scripts written by experienced hackers and virus writers.
disgruntled employees and ex employees - steal money and trade secrets, and sabotage systems
Term
What is a criminal attacker?
Definition
- most attackers are now criminal attackers.
- attackers with traditional motives are now a small and shrinking minority.
- large and complex black markets for attack programs, attacks - for - hire services, bot rentals and sales, money laundering,etc.
Term
What are the planning principles?
Definition
Risk analysis
comprehensive security
defense in depth
minimum permissions.
Term
What is risk analysis?
Definition
the process of balancing threat and protection costs for individual assets.
- annual cost of protection should not exceed the expected annual damage.
Term
What is comprehensive security?
Definition
- an attacker only has to find one weakness to succeed.
- a firm needs to close off all avenues of attack ( comprehensive security).
Term
What is defense in depth?
Definition
- every protection breaks down sometimes.
- the attacker should have to break through several lines of defense to succeed.
- even if one protection breaks down, the attack will not succeed.
Term
What are minimum permissions?
Definition
- people should be given minimum permissions- the least that they need to do their jobs- so that they cannot do unauthorized things.
Term
Planners do what? and implementers do what?
Definition
planners create policies, which specify what to do, but now how to do it.
implementers implement policies with local and technical expertise.
Term
What is authentication?
Definition
provings one's identity
Term
What does the process of authentication look like?
Definition
the supplicant proves its identity to the verifier by sending its credentials ( proofs of identity, password, etc) and the verifier accepts or rejects it.
Term
What are hybrid dictionary attacks?
Definition
- look for common variations of names and words.
- capitalizing only the first letter, ending with a single digit, etc.
Passwords that can be cracked with hybrid dictionary attacks are never adequately strong, regardless of how long they are.
Term
Passwords should be ____ and ____
Definition
Long and complex
Term
reusable passwords are too ____ to be used for high security today.
Definition
vulnerable
Term
What is meant by perspective?
Definition
goal is to eliminate reusable passwords.
Term
What are access cards?
Definition
permit door access
- proximity access cards do not require physical scanning.
- need to control distribution and disable lost or stolen cards.
Term
What are biometrics?
Definition
use body measurements to authencitate you.
Term
What is cryptography?
Definition
group of protections based on mathematics.
Term
Encryption methods are called ___, not ____
Definition
ciphers, not codes.
Term
The receiver decypts with the same ___ and ____ key
Definition
cipher and symmetric key
Term
A single key is used to ____ and ____ in both directions
Definition
encrypt and decrypt.
Term
____ _____ give message authentication and message integrity.
Definition
electronic signatures.
Term
what is SSL/TLS?
Definition
cryptographic system standard widely used in sensitive browser-webserver communication
Term
What does IPsec do?
Definition
protects packets and all of their embedded contents.
- automatically protects all applications
Term
What is digital certificate authentication?
Definition
- strongest form of authentication.
- two components
1.) everyone has a private key only he or she knows
2.) Everyoe also has a non secret public key.
Term
What are digital certificate authentication?
Definition
components
- public keys are available in unalterable digital certificates
- digital certificates are provided by trusted certificate authorities.
Term
What does the process of digital certificate authenctication look like?
Definition
1.) Supplicant claims to be someone ( true party )
2.) Calculation using supplicants private key.
3.) Certificate authority provides digital certificate of true party.
4.) Certificate contains public key of true party.
Term
Where does the verifier get the public key of the true party?
Definition
from the true party's digital certificate
Supporting users have an ad free experience!