Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
53 Cards in this Set
- Front
- Back
HOST/CLIENT |
Describes the relationship between twocomputer programs in which one programs, the client, makes a service requestfrom another program, the server, which fulfills the request. |
|
APPLICATION SERVER
|
A software framework dedicated to the efficientexecution of procedures (programs, routines, scripts) for supporting theconstruction of applications.
|
|
HUB
|
A commonconnection point for devices in a network.
|
|
SWITCH
|
A smallhardware device that joins multiple computers together within one LAN. |
|
ROUTER
|
Device that forwards data packets betweennetworks, creating an overlay inter network.
|
|
WIRELESS APPLICATION PROTOCOL (WAP) |
Describes a protocol suite allowing tehinteroperability of WAP equipment & software with many different networktechnologies, thus allowing the building of a single platform for competingnetwork technologies such as GSM & IS-95 (also known as CDMA) networks.
|
|
PROXY SERVER
|
Acts as an intermediary for requests fromclients seeking resources from other servers |
|
FIREWALL
|
Device/set of devices designed to permit/denynetwork transmission based upon a set of rules & is frequently used toprotect network from unauthorized access while permitting legitimatecommunications to pass.
|
|
VIRTUAL PRIVATE NETWORK (VPN) CONCENTRATOR
|
Device that incorporates the most advancedencryption & authentication techniques available; and are builtspecifically for creating a remote-access or site-to-site VPN and ideally are deployed where the requirement is for a single device to handle a very largenumber of VPN tunnels. |
|
BACK-UP |
Refers to making copies of data so that theseadditional copies may be used to restore the original after a data loss event. |
|
NETWORK REPEATER
|
Devices that regenerate incoming electrical,wireless or optical signals.
|
|
ACCESS
|
Access routers, including 'small office/homeoffice' (SOHO) models, are located at customer sites such as branch officesthat do not need hierarchical routing of their own. |
|
DISTRIBUTION |
Distribution routers aggregate traffic frommultiple access routers, either at the same site, or to collect the datastreams from multiple sites to a major enterprise location |
|
CORE |
Core router may provide a "collapsedbackbone" interconnecting the distribution tier routers from multiplebuildings of a campus, or large enterprise locations
|
|
BUS TOPOLOGY
|
Architecture in which a set of clients areconnected via a shared communications line, called a bus.
- simplest way to connect multiple clients, but may have problems when twoclients want to transmit at the same time on the same bus. - systems which use bus network normally have some scheme of collisionshandling/collision avoidance form communication on the bus, quite often usingCarrier Sense Multiple Access or the presence of a bus master which controlsaccess to the shared bus resource. |
|
STAR TOPOLOGY
|
One of the most common computer networktopologies |
|
RING TOPOLOGY |
Each node connects to exactly 2 othernodes, forming a single continuous pathway for signals through each node - aring. Data travels from node to node, with each node along the way handlingevery packet. |
|
MESH TOPOLOGY
|
Each node in the network may act as anindependent router, regardless of whether it is connected to another network ornot. |
|
LOCAL AREA NETWORK
|
Group of computers & associated devices thatshare a common communications line or wireless link.
|
|
WIDE AREA NETWORK (WAN)
|
Spans a large geographic area, such as a state,province or country. |
|
METROPOLITAN AREA NETWORK (MAN)
|
Usually interconnects a number of LANsusing a high-capacity backbone technology, such as fiber-optical links &provides up-link services to WANs & the internet. |
|
GLOBAL AREANETWORK |
Refers to any network that is composed ofdifferent interconnected computer networks (WANs) & also covers an unlimited geographical area. |
|
Open Systems Interconnection (OSI) |
A way of sub-dividing a communications systeminto smaller parts called layers. Similar communications functions are groupedinto logical layers.
|
|
Transmission Control Protocol and InternetProtocol (TCP/IP)
|
Is the most used network protocol |
|
Internet Protocol version 4 (IPv4) |
- Defined an IP address as a 32-bit number(consisting of 4 octets) |
|
Internet Protocol version 6 (IPv6)
|
- Developed in 1995, defined an IP address as a128-bit number (consisting of 16 octets)
- Mathematically, the new address space provides the potential for a max of2^128, or about 3.403x10^38 unique addresses. |
|
Unclassified but Sensitive Internet Protocol(IP) Router Network (NIPRNet)
|
A global long-haul IP based network to supportunclass IP data communications services for combat support applications to theDoD, Joint Chiefs of Staff (JS), Military Departments (MILDEPS), and CombatantCommands (COCOM)
|
|
Secret IP Router Network (SIPRNet) |
DoD's largest interoperable Command and Control(C2) data network, supporting: |
|
Joint Worldwide Intelligence CommunicationsSystem (JWICS)
|
Operated by the DIA as a secure global networkdesigned to meet the requirements for TS/SCI multimedia intelligence communications worldwide. Provides users an SCI-level high-speed multimedianetwork using high-capacity communications to handle data, voice, imagery &graphics |
|
Departmentof Defense Network GIG |
A globally interconnected, end-to-end set ofinformation capabilities for collecting, processing, storing, disseminating,and managing information on demand to warfighters, policy makers, & supportpersonnel. |
|
Defense Information System Network (DISN)
|
The United States DoD's enterprise network forproviding data, video & voice services. |
|
Navy/Marine Corps Intranet (NMCI) |
The major US-CONUS shore based Navy networkproviding SIPRNET & NIPRNET connectivity. |
|
OCONUS Navy Enterprise Network (ONE-NET) |
A Navy-wide initiative to install a common &secure IT infrastructure to OCONUS Navy locations to access NIPRNET &SIPRNET. |
|
IT-21 Network |
An information transfer strategy that providesNetwork Connectivity capable of Voice, Data & Video for afloat units. Itprovides access to NIPRNET, SIPRNET & JWICS, supports all tactical &non-tactical mission areas. IT-21 uses Commercial Off the Shelf (COTS)Technology to keep ships updated with the most modern equipment. |
|
Machine Language
|
A system of instructions & data executeddirectly by a computer's central processing unit. |
|
Assembly Languages |
A type of low-level language for programmingcomputers, microprocessors, micro-controllers, & other integrated circuits.They implement a symbolic representation of the numeric machine codes &other constants needed to program a particular CPU architecture. |
|
High-level Language |
A programming language with strongabstraction from the details of the computer. It may use natural languageelements, be easier to use or be more portable across platforms. |
|
Operating System: |
A set of system software programs in a computerthat regulate the ways application software programs use the computer hardware& the ways that users control the computer. |
|
Applications |
Computer software designed to help the user toperform singular or multiple related specific tasks.
|
|
Virus |
Computer program that can copy itself and infecta computer. (in some form of executable code) when itshost is taken to the targeted infected computer. |
|
Worms |
Self-replicating malware computer programs.
They use a computer network to send copies of their selves to other nodes(computers on the network) and may do so without any user intervention. |
|
Trojans
|
Malware that appears to perform a desirablefunction for the user prior to run or install but instead facilitatesunauthorized access of the user's computer system. |
|
Backdoor |
In computer systems (or cryptosystem oralgorithm) are a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, whileattempting to remain undetected. |
|
Phishing |
The criminally fraudulent process ofattempting to acquire sensitive information by masquerading as a trustworthyentity in an electronic communication; information such as: |
|
Network Enumeration |
Computing activity in which user names, andinfo on groups, shares and services of networked computers are retrieved. |
|
Buffer Overflow |
Anomaly where a program, while writing datato a buffer, overruns the buffer's boundary and overwrites adjacent memory. |
|
SQL injection |
A code injection technique that exploits asecurity vulnerability occurring in the database layer of an application. Theidea is to convince the application to run SQL code that was not intended.
|
|
DictionaryAttack |
Technique for defeating a cipher orauthentication mechanism by trying to determine its decryption key or passphraseby searching likely possibilities
|
|
Privilege Escalation
|
Act of exploiting a bug or design flaw in asoftware application to gain access to resources which normally would have been protected from an application or user. |
|
BruteForce Attack |
Strategy used to break the encryption ofdata. It involves traversing the search space of possible keys until thecorrect key is found (trying to "crack" a password). |
|
SocialEngineering |
Act of manipulating people into performingactions or divulging confidential information, rather than by breaking in orusing technical cracking techniques; essentially a fancier, more technical wayof lying. |
|
Public KeyInfrastructure (PKI) |
- Set of hardware, software, people, policies,and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. |
|
Domain Name System (DNS)
|
- Translates domain names (meaningful tohumans) into the numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.
|