Shared Flashcard Set

Details

CIS110
Introduction to Security 110
67
Computer Networking
Not Applicable
05/27/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
ACE- access control entry
Definition
is each entry in the ACL table,it includes 4 items; a security identifierfor the user and group accounts, or logon sessions, an access mask that specifies the access rights controlled, a flag that indicates the type, a set of flags that determine whether objects can inherit permissions
Term
Access control model
Definition
a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications
Term
Account Lockout Policy
Definition
is an active directory domain services feature, prevents a logon after a set number of failed logon attempts within a specified period and can also specify the length of time that the lockout is in force
Term
ACL- access control list
Definition
a set of permissions that are attached to an object. Specifies which subjects are allowed to access the object and what operations they can perform on it
Term
Authentication
Definition
checking the delivery persons credentials to be sure that they are authentic and not fabricated
Term
Authorization
Definition
granting permission to take the action
Term
Baseline
Definition
a reference set of data against which operational data is compared
Term
Behavioral biometrics
Definition
authenticates by normal actions that the user performs; keystroke dynamics, voice recognition, and computer foot printing
Term
Brute force attack
Definition
an automated password cracking technique in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in the stole file
Term
CHAP- Challenge handshake authentication protocol
Definition
authenticates a user or network host to an authenticating entity such as an Internet service provider, providing protection against replay attacks by the peer through the use of an incrementally changing identifier and of a variable challenge-value
Term
Cognitive biometerics
Definition
related to the perception, thought process, and understanding of the user. considered much easier for the user to remember because it is based on the users life experiences
Term
Common Access Card (CAC)
Definition
a Department of Defense smart card that is used for identification for active duty and reserve military personnel, along with civilian employees and special contractors
Term
DAC-discretionary access control
Definition
one of four access controls. the least restrictive access control model, in which the owner of the object has total control over it
Term
Directory service
Definition
a database stored on the network itself that contains information about users and network devices
Term
DMZ- demilitarized zone
Definition
functions as a separate network outside the secure network perimeter; untrusted outside users can access it but cannot enter the secure network
Term
DNS- domain name system
Definition
a hiearchical or tree name system for matching computer names and numbers
Term
DNS caching
Definition
a small database maintained by a computers OS. it contains records of all recently accessed internet domains
Term
DNS poisoning
Definition
an attack that substitutes certain addresses so that a computer is automatically redirected to another device
Term
Firewall- packet filter
Definition
hardware or software that is designed to prevent malicious packets from entering or leaving computers or a network
Term
FTP- file transfer protocol
Definition
an unsecure TCP/IP protocol that is commonly used for data transfer
Term
HIDS- host intrusions detection system
Definition
software based application that runs on a local host computer that can detect an attack as it occurs
Term
Hub
Definition
a standard network device for connecting multiple Ethernet devices together to make them function as a single segment
Term
Hybrid attack
Definition
a variation of the dictionary attack, it will slightly alter dictionary words by adding numbers to the end af the password, spelling words backwards, slightly misspelling words, or including special characters
Term
ICMP-Internet control message protocol
Definition
a TCP/IP protocol that is used by devices to communicate updates or error information to other devices
Term
IP address
Definition
a numerical label assigned to each device participating in a computer network that uses the Internet protocol for communication. Serves 2 principle functions: host or network interface identification and location addressing
Term
Job rotation
Definition
instead of one person having sole resposibility for a function, individuals are periodically moved from one job responsibility to another
Term
Kerberos
Definition
an authentication system developed by MITand is used to verify the identity of networked users
Term
Load balancing
Definition
a device that can direct requests to different servers based on a variety of factors, such as the number of server connections, the servers processor utilization and overall performance
Term
MAC address
Definition
a unique identifier assigned to network interfaces for communications on the physical network segment
Term
NAT
Definition
a technique that allows private IP addresses to be used on the public Internet
Term
NIDS- network intrusion detection system
Definition
a technology that watches for attacks on the network and reports back to a central device
Term
NIPS- network intrusion prevention system
Definition
a technology that monitors network traffic to immediately react to block a malicious attack
Term
PAT- port address translation
Definition
each packet is givin the same IP address but a different TCP port number allowing a single public address to be used by several users
Term
Personal Identity Verification (PIV)
Definition
a government standard for smart cards that covers all government employees
Term
Ping of Death
Definition
a malformed ping using ICMP is sent to the victims computer that exceeds the size of an IP packet causing the host to crash
Term
Proxy server
Definition
a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user
Term
RADIUS
Definition
an industry standard authentication service with wide spread support across nearly all vendors of network equipment
Term
Rainbow tables
Definition
large pre-generated data sets of encrypted passwords used in password attacks
Term
Router
Definition
a device that can forward packets across computer networks
Term
seperation of duties
Definition
the practice of requiring that processes should be divided between two or more individuals
Term
Smurf DOS attack
Definition
an attack that broadcasts a ping request to all computers on a network yet changes the address from which it came, to that of the target, making it appear that the target computer is asking for a response from all computers- they respond overwhelming the target causing it to crash
Term
SNMP- simple network management protocol
Definition
a TCP/IP protocol that exchanges management information between networked devices and allows network administrators  to remotely monitor, manage and configure devices on the network
Term
Standard biometrics
Definition
uses fingerprints or other unique physical characteristics of a persons face, hands, or eyes for authentication
Term
Stateful packet filtering
Definition
keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions
Term
Subnetting
Definition
a technique that uses IP addresses to divide a network into network, subnet, and host
Term
switch
Definition
a device that connects network segments and forwards only frames intended for that specific device or frames sent to all devices
Term

TACAS- 

terminal access control access control system

Definition
an authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server
Term
TCP/IP
Definition
tha most common protocol suite used today for local area networks and the internet
Term
Telnet
Definition
a network protocol used on the internet or local area networksto provide a bidirectional interactive text-oriented communicatio facility using a virtual terminal connection
Term
Token
Definition
a small device with a window display that shows a code to be used for authentication
Term
UDP- user datagram protocol
Definition
computer applications can send messages to other host on a Internet protocol network without prior communications to set up special transmission channels or data paths
Term
VLAN- Virtual LAN
Definition
a technology that allows scattered users to be logically grouped together even thoughthey may be attached to different switches
Term
VPNvirtual private network
Definition
a technology to use an unsecured public network like a secure private network
Term

Layer 7

 

Definition
Application
Term
Application layer
Definition

provides the user interface to allow network services 

provides services for user applications:

Telnet, FTP, TFTP, SMTP, IMAP, POP, DNS

Term
Layer 6
Definition
Presentation
Term
Presentation layer
Definition

is concerned with how the data is represented and formatted for the user

used for translation

compressed and encryption 

HTTP

Term
Layer 5
Definition
Session
Term
Session layer
Definition

has the resposibility of permitting the two parties on the network to hold ongoing communications across the network

allows devices to establish and manage sessions

Term
Layer 4
Definition
Transport
Term
Transport layer
Definition

is responsible for ensuring that error free data is givin to the user 

provides connection establishment, management, and termination as well as acknowledgments and retransmissions

TCP, UDP

Term
Layer 3
Definition
Network
Term
Network layer
Definition

picks the route the packet is to take and handles the addressing of the for delivery

makes logical addressing, routing, fragmentation and reassembly available

IPv4/IPv6, ICMP, ARP

Term
Layer 2
Definition
Datalink
Term
Datalink layer
Definition

is resposible for dividing the data into packets

error detection and correction

performs physical addressing, data framing, error detedtion, and handling

ARP, Frame relay, PPP, Token ring

Term
Layer 1
Definition
Physical
Term
Physical layer
Definition

sends the signal to the network or receives the signal from the network 

involved with encoding and signaling, data transmission, and reception

Supporting users have an ad free experience!