Term
|
Definition
-Connectionless protocol that's responsible for network addressing -Provides routing between networks |
|
|
Term
TCP Transmission Control Protocol |
|
Definition
Connection oriented protocol that establishes connections between endpoints and guarantees delivery |
|
|
Term
UDP User Datagram Protocol |
|
Definition
Connectionless oriented with no guarantee of delivery |
|
|
Term
|
Definition
-Client sends syn to server -Server must have open port that can accept syn. Send ACK packet and establishes connection -Client receives Syn/Ack from server and responds with an ACK packet and establishes connection |
|
|
Term
|
Definition
-Adds security to original DNS spec -Protected Zones -Digitally signed authenticating dns server -Not encrypted -Defense for DNS poisoning and DNS Hijacking -Port 53 |
|
|
Term
|
Definition
-Adds AES encryption to audio and video -Security protocol adds confidentiality, message authentication and replay protection -Used to secure VOIP Traffic -Adds HMAC hashing with SHA1 |
|
|
Term
|
Definition
Secure Multiprotocol Internet Mail Extensions |
|
|
Term
S/MIME Challenges in Implementation |
|
Definition
-Sending and receiving users required to obtain key/certificate -End to End Encryption -Cannot be scanned by malware scanner without SSL Decryptors |
|
|
Term
|
Definition
-Port 636 -Secures Traffic between client and server over ssl/tls -Requires DC to have an X.509 certificate |
|
|
Term
|
Definition
-Secure file transfers using SSL -Encryption can be turned off if other encryption is in use like IPSec -TCP Ports 989, 990 |
|
|
Term
SFTP - Secure Shell File Transfer |
|
Definition
|
|
Term
|
Definition
-UDP Port 161 -Remote management of IP devices -Secure protocol |
|
|
Term
|
Definition
-SSL no longer used replaced by TLS -Adds confidentiality and data integrity by encapsulating other protocols |
|
|
Term
|
Definition
-Authentication using SSL or TLS -privacy/integrity of data -Protects against MiTM attacks -BiDirectional encryption of communication between client/server |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Only allows dhcp through a trusted interface |
|
|
Term
|
Definition
Spoof a MAC address and constantly request DHCP addresses from the DHCP server |
|
|
Term
Control for DHCP Starvation Attack |
|
Definition
Configure switch interfaces to limit the number of MAC addresses that could be associated with an individual interface on the switch. |
|
|
Term
Programs that use subscriptions |
|
Definition
|
|