Shared Flashcard Set

Details

Midterm Terms
Stuff to Know for Midterm
41
Computer Networking
Undergraduate 2
03/26/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
Availability
Definition
Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them.
Term
Integrity
Definition
Assurance that the information is authentic and complete. Ensuring that information can be relied upon to be sufficiently accurate for its purpose. The term Integrity is used frequently when considering Information Security as it is represents one of the primary indicators of security (or lack of it). The integrity of data is not only whether the data is 'correct', but whether it can be trusted and relied upon. For example, making copies (say by e-mailing a file) of a sensitive document, threatens both confidentiality and the integrity of the information. Why? Because, by making one or more copies, the data is then at risk of change or modification.
Term
Confidentiality
Definition
Assurance that information is shared only among authorized persons or organizations. Breaches of Confidentiality can occur when data is not handled in a manner adequate to safeguard the confidentiality of the information concerned. Such disclosure can take place by word of mouth, by printing, copying, e-mailing or creating documents and other data etc. The classification of the information should determine is confidentiality and hence the appropriate safeguards.
Term



NAT

Definition




NAT assigns nonrouting local addresses to the computer systems

in the local area network and uses the single ISP-assigned address to communicate with the Internet. 

Since the internal computers are not visible to the public network, they are very much less likely to be scanned or compromised.

Term

 

 

 

Honeypot

Definition





 a system that is used for the express purpose of allowing people to break into it, so that the system owner may observe the attacker's activity.

Term





honeynet

Definition






is a network (simulated or real) of honeypots.

Term

 

 

 

IDS

Definition





An IDS (Intrusion Detection System) is a device or application used to inspect all network traffic and alert the user or administrator when there has been unauthorized attempts or access.

Term



IPS

Definition




 The main functions of intrusion prevention systems are to identify malicious activity, log information about said activity, attempt to block/stop activity, and report activity.

Term

 

 

 

The Differance Between IDS & IPS

Definition

An IDS does just what its name tells us - it detects network intrusion.  Simple enough!  However, the IDS is basically a "town crier" in that it will notify other network devices about the attack, but does not directly defend against the attack itself.The IDS does not receive traffic flows directly.  Instead, the traffic flows are mirrored to the IDS.By the time the IDS detects an issue and notifies the appropriate network devices, the beginning of the infected traffic flow is already in the network.


In contrast, our Intrusion Prevention System (IPS) does sit in the middle of the traffic flow - in this case, the IPS will actually be our Cisco router.  When the IPS detects a problem, the IPS itself can prevent the traffic from entering the network. 

Term

 

TACACS+

 

Terminal Access Controller Access Control System,

Definition




anauthentication protocol that was commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication serverin order to determine if the user has access to the network.

Term




(RADIUS)  

Remote Authentication Dial In User Service 

Definition





is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for computers to connect and use a network service.

Term

 

 

 

 

Kerberos 

Definition

 

 

 

A cryptosystem that uses symmetric key encryption

to validate an individual user to various network

resources.

Term

 

 

 

 

honeynet

Definition

 

 

 

 

A network or system subnet that is configured to

misdirect hackers by resembling networks or system subsystems

that are rich with information.

 

Term




Honeypot 

Definition

 

 

 

Decoy systems designed to lure potential attackers

away from critical systems.

Term

 

 

 

 

Hub

Definition
 is a device that connects PCs together. In general, what is called a hub in today’s market is a "dumb" device. In a hub, when one PC sends data onto the wire, the hub simply forwards the packets to all the other devices connected to it. Each device is responsible for determining which packets are destined for it and ignoring the others. Current "hubs" typically share bandwidth between all the ports. In the days of coaxial networking, hubs were often called "bridges". Because they forward every packet that they receive, they do nothing to streamline the traffic on your local network. 
Term






                             SWITCH

Definition
. A switch is a little smarter than a hub, in that it records the IP and MAC addresses in a table of all the devices connected to it. Thus, when a packet is put onto the wire by one device, the switch reads the destination address information to determine if the destination device is connected to it. If it is, the switch forwards the packet ONLY to the destination device, sparing the other devices connected to it from having to read and deal with the traffic (making your network more efficient). If the switch does not recognize the destination device, then the switch sends the packet to everything connected to it, thereby requiring the devices to decide for themselves whether or not the packet is for them. In general, switches provide each device connected to them with dedicated bandwidth. 
Term

 

 

 

Router

Definition






 is the "smartest" device of them all. A router records the address information of everything connected to it like a switch. But it also records the address of the next closest router in the network.

Term

 

 

 

Firewalls

Definition





Firewalls prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.

Term



SFTP

Definition

 


The Abbreviation SFTP nowadays invariably means Secure File Transfer Protocol, however there is another protocol with the same abbreviation (Simple File Transfer Protocol). All occurrences of the term SFTP on this website (www.radinks.com) refers to Secure File Transfer Protocol.

Term


 


Internet Protocol Version 6 address (IPv6 address)

Definition





 is a numerical label that is used to identify a network interface of a computer or other network node participating in an IPv6-enabledcomputer network.

Term





buffer overflow

Definition





buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold.

Term



WORMs

Definition

 



  1. Remind students that worms are malicious programs that replicate themselves constantly without requiring another program to provide a safe environment for replication. Worms can continue replicating themselves until they completely fill available resources, such as memory, hard drive space, and network bandwidth.

 

Term



  1. Virus:
Definition




 Each infected machine infects certain common executable or script files on all computers to which it can write with virus code that can cause infection.

Term
proxy server
Definition
Synonymous with proxy firewall. A server that is configured to look like a Web server and performs actions.
on behalf of that server to protect it from hacking.
Term
VPN
Definition
Remote Access(if your at home and you want to use remote access what happens.)Remote private network and stuff like that.
Term
DMZ
Definition
Space between a Secure Network and a Unsecured Network,Demiliterized Zone
Term
IPV4 (how many bits)
Definition
32 bits
Term
IPV6 (how many bits)
Definition
128 bits
Term
SWITCH
Definition
used to set up VLANs ( if you want to set up VLANS)
Term
VLANS
Definition
used to separate different types of traffic on a network,if you have a merged network ,you'll use a VLAN to set up for your voice traffic.You can also ,if your trying to set up and you want to seperate VLAN traffic on an AP access point for a customer (the Lobby)so might want to put that on its own VLAN.
Term
NAT
Definition
It hides your private IP Address and makes it Public.( you've got a whole bunch of privates inside your company and when it comes out into the public network it will be a different IP address ,it will be a NATed address.
Term
Radius ,
Definition
Authenticate's User's on Dial-UP , use,s UDP,
Term
TACAS+
Definition
Authenticates user's also and uses TCP protocol.for transport;and is a CYSCO propitiatory authentication server.
Term
What Port Is This (HTTPS)
Definition
443
Term
What Port Is This (SSH)
Definition
22
Term
What Port Is This (TELnet)
Definition
23
Term
Firewall
Definition
Can Block Ports,close off ports,it can monitor,
Term
Proxy or (Proxy Server)
Definition
A server that does things in your name, (It Cashes),,,,It can keep memory of where you went out on a site;so you don't have to go the distribution,and cuts down on the overall traffic on networks.
Term
IDS
Definition
Detects attacks while there occurring or have already occurred.
Term
IPS
Definition
This is Pro active it trys to prevent,
Takes measure after the attack.
Term
Spear phishing
Definition
A highly targeted phishing attack that usually
appears to be from an employer, colleague, or other legitimate
correspondent
Supporting users have an ad free experience!