Shared Flashcard Set

Details

Domain 3 - ISC2
CISSP - Telecom and Network Security (Technology Concepts)
106
Computer Science
Professional
07/29/2011

Additional Computer Science Flashcards

 


 

Cards

Term
Protocols
Definition
a standard set of rules that determines how computers communicate with each other across networks despite their differences (PC, UNIC, Mac..)
Term
Layered architecture
Definition
Shows how communication should take place.
-Clarify the general functions of a communication process
-To break down complex networking processes into more manageable sublayers
-Using industry-standard interfaces enables interoperability
-To change the features of one layer without changing all of the code in every layer
-Easier troubleshooting
Term
OSI – Open Systems Interconnect Model
Definition
Layer 7 - Application
Layer 6 - Presentation
Layer 5 - Session
Layer 4 - Transport
Layer 3 - Network
Layer 2 - Data Link
Layer 1 - Physical
Term
Physical
Definition
Responsible for the physical transmission of the binary digits through the physical medium. This layer includes things such as the physical cables, interfaces, and data rate specifications. User information maintained at this layer is called bits (the 1s and 0s). Layer 1
Term
Data Link
Definition
Responsible for the physical addressing of the network via MAC addresses. Ther are two sublevels to the Data-Link layer. MAC and LLC. The Data-Link layer has error detection, frame ordering, and flow control. User information maintained at this layer is called frames. Layer 2.
Term
Network
Definition
Responsible for the routing of user data from one node to another through the network including the path selection. Logical addresses are used at this layer. User information maintained at this layer is called packets.
Term
Transport
Definition
Responsible for the guaranteed delivery of user information. It is also responsible for error detection, correction, and flow control. User information at this layer is called datagrams.
Term
Session
Definition
Responsible for the setup of the links, maintaining of the link, and the link tear-down between applications. Layer 5
Term
Presentation
Definition
Responsible for the formatting of the data so that it is suitable for presentation. Responsible for character conversion (ASCII/EBCDIC), Encryption/Decryption, Compression, and Virtual Terminal Emulation. User information maintained at this layer is called messages. Layer 6
Term
Application
Definition
Responsible for all application-to-application communications. User information maintained at this layer is user data. Layer 7
Term
Layer 7 Protocols
Definition
FTP, SMB, TELNET, TFTP, SMTP, HTTP, NNTP, CDP, GOPHER, SNMP, NDS, AFP, SAP, NCP, SET
Term
Layer 7
Definition
Application - provides confidentiality, authentication, data integrity, non-repudiation.
Term
Layer 6 Protocols
Definition
ASCII, EBCDIC, POSTSCRIPT, JPEG, MPEG, GIF
Term
Layer 6
Definition
Presentation - provides confidentiality, authentication, encryption
Term
Layer 5 protocols
Definition
Remote Procedure Calls (RPC) and SQL, RADIUS, DNS, ASP
Term
Layer 5
Definition
Session - provides no security
Term
Layer 4 protocols
Definition
TCP, UDP, SSL, SSH-2, SPX, NetBios, ATP
Term
Layer 4
Definition
Transport - provides confidentiality, authentication, integrity
Term
Layer 3 protocols
Definition
IP, IPX, ICMP, OSPF, IGRP, EIGRP, RIP, BOOTP, DHCP, ISIS, ZIP, DDP, X.25
Term
Layer 3
Definition
Network - provides confidentiality, authentication, data integrity
Term
Layer 2 protocols
Definition
L2F, PPTP, L2TP, PPP, SLIP, ARP, RARP, SLARP, IARP, SNAP, BAP, CHAP, LCP, LZS, MLP, Frame Relay, Annex A, Annex D, HDLC, BPDU, LAPD, ISL, MAC, Ethernet, Token Ring, FDDI
Term
Layer 2
Definition
Data link provides confidentiality
Term
Layer 1 protocols
Definition
10BaseT, 100BaseT, 1000BaseT, 10Base2, 10Base5, OC-3, OC-12, DS1, DS3, E1, E3, ATM, BRI, PRI, X.23
Term
Layer 1
Definition
Physical - provides confidentiality
Term
Data encapsulation
Definition
Process in which information from one packet is wrapped around or attached to the data of another packet. In OSI model each layer encapsulates the layer immediately above it.
Term
security service
Definition
Collection of security mechanisms, files, and procedures that help protect the network.
Term
OSI Security Services
Definition
-Authentication
-Access control
-Data confidentiality
-Data integrity
-Non-repudiation
-Logging and monitoring
Term
OSI Security Mechanisms
Definition
-Encipherment
-Digital signature
-Access Control
-Data Integrity
-Authentication
-Traffic Padding
-Routing Control
-Notarization
Term
TCIP/IP layers
Definition
-Application Layer
-Host to Host Layer
-Internet Layer
-Network Access Layer
Term
Host to Host protocols
Definition
TCP and UDP
Term
Internet Layer Protocols
Definition
IP, ARP, RARP, ICMP
Term
Network Access
Definition
Consists of routines for accessing physical networks and the electrical connection. Layer 1 of the TCP/IP model
Term
Internet Layer
Definition
Defines the IP datagram and handles the routing of data across networks. Layer 2 of the TCP/IP model
Term
Host to Host
Definition
Provides end-to-end data delivery service to the Application Layer. Layer 3 of the TCP/IP model
Term
Application Layer
Definition
Consists of the applications and processes that use the network. Layer 4 of the TCP/IP model
Term
TCP – Transmission Control Protocol
Definition
-Connection Oriented
-Sequenced Packets
-Acknowledgment is sent back for received packets
-If no acknowledgement then packet is resent
-Packets are re-sequenced
-Manageable data flow is maintained
Term
User Datagram Protocol (UDP)
Definition
-Best effort
-Doesn’t care about sequence order
-Connectionless
-Less overhead and faster than TCP
Term
IP – Internet Protocol
Definition
Internet Layer Protocol
-All hosts on a network have an IP address
-Each data packet is assigned the IP address of the sender and receiver
-It provides an ‘unreliable datagram service’. Provides:
-No guarantees that the packet will be delivered
-No guarantee that the packet will be delivered only once
-No guarantee that it will be delivered in the order which it was sent
Term
ARP – Address Resolution Protocol
Definition
Internet Layer Protocol
-Use the IP Address to get the MAC Address
-MAC address is 48 bit
-IP address is 32 bit
-Only broadcast to network first time, otherwise stores IP and MAC info in table
Term
RARP – Reverse Address Resolution Protocol
Definition
Internet Layer protocol.
-Use the MAC Address to get the IP Address
-RARP Server tells diskless machines IP Address
Term
ICMP – Internet Control Message Protocol
Definition
Internet Layer Protocol
-Management Protocol and messaging service provider for IP.
-Sends messages between network devices regarding the health of the network.
-Ping is ICMP packet
-Ping checks if a host is up and operational
Term
TCP/IP Protocols
Definition
-Telnet – Terminal Emulation (No File Transfer)
-FTP – File Transfer Protocol – (Can not execute files)
-TFTP – Trivial FTP – no directory browsing capabilities, no authentication (it is unsecure), can only send and receive files.
-Some sites choose not to implement TFTP due to the inherent security risks.
-TFTP is an UDP-based file transfer program that provides no security.
-NFS – Network File Sharing
-SMTP – Delivers emails
-LDP – Line Printer Daemon – with LPR enables print spooling
-X-Windows – for writing graphical interface application
-SNMP – Simple Network Management Protocol. Provides for the collection of network information by polling the devices on the network from a management station. Sends SNMP traps (notification) to MIBS Management Information Bases
-Bootstrap (BootP) protocol – Diskless boot up. BootP server hears the request and looks up the client’s MAC address in its BootP file. It’s an internet layer protocol.
Term
SET – Secure Electronic Transaction
Definition
-Originated by Visa and MasterCard
-Being overtaken by SSL
Term
SHTTP - Secure HTTP
Definition
-Early standard for encrypting HTTP documents
-Also being overtaken by SSL
Term
SSH-2
Definition
-SSH has RSA Certificates
-Supports authentication, compression, confidentiality, and integrity
-DES Encryption
-Because Secure Shell (SSH-2) supports authentication, compression, confidentiality, and integrity, SSH is used frequently for Encrypted File Transfer
Term
SSL – Secure Socket Layer
Definition
-Contains SSL record protocol and SSL Handshake Protocol
-Uses symmetric encryption and public key for authentication
-MAC – Message Authentication Code for Integrity
Term
SKIP – Simple Key Management for Internet Protocol
Definition
Similar to SSL – no prior communication required
Term
Packet Filtering Firewall
Definition
First Generation
-Screening Router
-Operates at Network and Transport level
-Examines Source and Destination IP Address
-Can deny based on ACLs
-Can specify Port
Term
Application Level Firewall
Definition
Second Generation
-Proxy Server
-Copies each packet from one network to the other
-Masks the origin of the data
-Operates at layer 7 (Application Layer)
-Reduces Network performance since it has do analyze each packet and decide what to do with it.
-Also Called Application Layer Gateway
Term
Stateful Inspection Firewalls
Definition
Third Generation
-Packets Analyzed at all OSI layers
-Queued at the network level
-Faster than Application level Gateway
Term
Dynamic Packet Filtering Firewalls
Definition
-Allows modification of security rules
-Mostly used for UDP
-Remembers all of the UDP packets that have crossed the network’s perimeter, and it decides whether to enable packets to pass through the firewall
Term
Kernel Proxy
Definition
-Runs in NT Kernel
-Uses dynamic and custom TCP/IP-based stacks to inspect the network packets and to enforce security policies.
Term
Packet Filtering Routers
Definition
-Sits between trusted and untrusted networks
-Uses ACLs
-ACLs can be manually intensive to maintain
-Lacks strong user authentication
-ACLs can degrade performance
-Minimal Auditing
Term
Screened Host Firewall
Definition
-Employs packet filtering and Bastion Host
-Provides network layer (packet filtering) and application layer (proxy) services
-Penetration requires getting by external router (packet filtering) and Bastion Host (proxy).
Term
Dual Homed Host Firewall
Definition
-Contains two NICs
-One connected to the local “trusted” network
-One connected to the external “untrusted” network
-Blocks or filters traffic between the two.
-IP forwarding is disabled
Term
Screened Subnet Firewall
Definition
-One of the most secure
-Two packet filtering routers and a Bastion Host
-Provides network layer (packet filtering) and application layer (proxy) services
-Provides DMZ
-Complex configuration
Term
SOCKS Server
Definition
-Circuit level proxy server
-Requires SOCKS client on all machines
-Used to manage outbound Internet access
-IT Overhead intensive
Term
Class A addresses
Definition
10.0.0.0 to 10.255.255.255
Term
Class B addresses
Definition
172.16.0.0 to 172.31.255.255
Term
Class C addresses
Definition
192.168.0.0 to 192.168.255.255
Term
Large networks with many devices. 1-127
Definition
Class A
Term
Medium-sized networks. 128-191
Definition
Class B
Term
Small networks (fewer than 256 devices). 192-223
Definition
Class C
Term
Multicast addresses
Definition
Class D
Term
Virtual Private Networks
Definition
-Secure connection between two nodes using secret encapsulation method.
-Secure Encrypted Tunnel – encapsulated tunnel (encryption may or may not be used)
Term
3 methods to create a Tunnel
Definition
-Installing software or agents on client or network gateway.
-Implementing user or node authentication systems.
-Implementing key and certificate exchange systems.
Term
PPTP – Point-to-Point Tunneling Protocol
Definition
-Works at the Data Link Layer
-Single point to point connection from client to server
-Common with asynchronous connections with NT and Win 95
Term
L2TP - Layer 2 Tunneling Protocol
Definition
-Combination of PPTP and earlier Layer 2 Forwarding Protocol (L2F)
-Multiple protocols can be encapsulated within the L2TP
-Single point to point connection from client to server
-Common with Dial up VPNs
Term
IPSec
Definition
-Operates at the network layer
-Allows multiple and simultaneous tunnels
-Encrypt and authenticate IP data
-Focuses more on Network to Network Connectivity
Term
Tunnel Mode
Definition
Entire packet is encrypted and encases in IPSec packet
Term
Transport Mode
Definition
Only datagram is encrypted leaving IP address visible.
Term
Datagram
Definition
A self-contained, independent entity of data carrying sufficient information to be routed from the source to the destination.
Term
VPN Devices
Definition
-Hardware and Software devices that utilize VPN Standards
-Two types: IPSec Compatible and Non-IPSec Compatible
Term
IPSec Compatible VPN Devices
Definition
-Installed on a networks perimeter and encrypt traffic between the two
-Because IPSec only work with IP
-Operate at Network Layer
-Operate in Tunnel or Transport Mode
Term
Non-IPSec Compatible VPN Devices
Definition
SOCKS, PPTP and SSH
Term
SOCKS
Definition
Not a traditional VPN protocol but is robust and operates at Application Layer.
Term
PPTP
Definition
Implemented in Win95 and NT
-Multiprotocol and uses PAP and CHAP user authentication.
-Compresses Data
-End-to-End encryption
Term
Secure Shell SSH-2
Definition
Not strictly a VPN but can be used as one with Terminal Session
Term
Firewall Based VPNs
Definition
-Frequently available with Third Generation (Stateful Inspection) Firewalls
-Operate at the Application layer
-Performance degradation is often a problem
Term
Data Network Types
Definition
-Local Area Network (LAN)
-Wide Area Network (WAN)
-Internet
-Intranet
-Extranet
Term
Local Area Networks – LAN
Definition
Discrete network for limited geographical area like a building or a single floor
Term
CAN - Campus Area Network
Definition
Connects multiple buildings with each other over switched backbone
Term
MAN – Metropolitan Area Network
Definition
LAN over a city wide metropolitan area.
Term
Wide Area Networks - WAN
Definition
-Network of sub networks that interconnect LANs over large geographic areas.
-WAN is basically everything outside of LAN
Term
Intranet
Definition
-Internet like logical network that uses a companies internal physical network structure
-More security and control than Internet
-Uses Internet tools like browsers.
Term
Extranet
Definition
-Extranet can be accessed by users outside of the company, (i.e. vendors and partners) but not the general public.
-Includes some type of authentication or encryption
Term
Asynchronous
Definition
Basis of modems and dial up remote access. Must operate at same speed.
Term
Synchronous
Definition
Very high speed, governed by electronic clock timing signals
Term
Common Data Network services
Definition
-File Services
-Mail Services
-Print Services
-Client/Server Services
-Domain Name Services
Term
Domain Name Service
Definition
Matches Internet Uniform Resource Locator (URL) with the actual IP address of the server providing the URL. Maps host names to IP Addresses. IT is a global network of servers that provide this service.
Term
Client/ Server Services
Definition
Allocate computing resources among workstations
Term
Mail Services
Definition
send and receive mail internally and externally
Term
Files Services
Definition
Share data files and subdirectories on file server
Term
Routing Methodolgies
Definition
-Static routing
-Distance Vector Routing
-Link State
Term
Link state routing
Definition
-uses only first hand information when building tables by maintaining every other router's Link State Protocol (LSP) Frame
-Open Shortest Path First (OPSF) protocol features least-cost routing, multipath routing, and load balancing
Term
Distance vector routing
Definition
-Routing Information Protocol(RIP)used to maintian dynamic routing tables
-Best routing path determination by the fewest hops
Term
Static routing
Definition
-Specific route definitions
-No need for routers to exchange information dynamically
Term
Spanning Tree Protocol (STP)
Definition
Developed by Digtial Equipment Corporation (DEC)is now the IEEE 802.1d standard
-Uses Spanning tree algorith (STA) to identify the best path to communicatie with a node and any alternative paths
Term
Transparent Bridging
Definition
Allows a switch to learn information about the location of nodes on the network
Term
Steps of Transparent Bridging
Definition
-learning
-flooding
-filtering
-forwarding
-aging
Term
Malicious code
Definition
-Virsus
-Spware
-Trojan Horses
-Remote Access Trojans (RATS)
-Logic Bomb
-Worms
Term
Virsus Types
Definition
-Macro Viruses
-Polymorphic Viruses
-Stealth Viruses
Term
Virus Lifecycle
Definition
-Replication
-Activation
Term
Remote Access Trojans (RATs)
Definition
Program that allows access to a computer's resources without the owners knowledge
Term
Common Worms
Definition
-Sobig
-IloveYou
-MyDoom
-Sasser
Term
Spyware
Definition
Any technology that aids in gathering information about a person or organization without their knowledge or consent
Supporting users have an ad free experience!