Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
The internet is made up of millions of _____ and _____
|
Hosts and Routers
|
|
The internet is a network of networks.
Tier-1 ISPs control the internet backbone (the core routers) Lower tier ISPs _______ |
Pay higher tier ISP for internet access and provide access to end users.
|
|
Delivery of data on the internet is governed by protocol layers.
TCP and UDP are part of ______ layer |
Transport Layer Protocols– control main Host-to-host data transfer
|
|
Delivery of data on the internet is governed by protocol layers.
FTP, HTTP, SMTP are part of _____ layer |
Application Layer – Supports network applications
|
|
Delivery of data on the internet is governed by protocol layers.
IP addresses are part of _____ layer |
Network Layer – Supports routing of data
|
|
Delivery of data on the internet is governed by protocol layers.
Ethernet connections are part of ________ layer. |
Link Layer – Communication between adjacent network elements (computer - computer, computer - router, etc)
|
|
Delivery of data on the internet is governed by protocol layers.
Wire voltages & radio signals are part of ______ layer. |
Physical Layer – The "bits on the wire", the actual connections
|
|
IP - Internet Protocol - is concerned with _________
|
Concerned with routing data from host to host across the internet
|
|
Classful addressing - list each class and it's structure
|
Class A – First 1 bit fixed, 7 bits for network, 24 bits for host : [1][ 7b ][ 24b ]
Class B – First 2 bits fixed, 14 bits for network, 16 bits for host : [10][ 14b ][ 16b ] Class C – First 3 bits fixed, 21 bits for network, 8 bits for host : [110][ 21b ][ 8b ] Class D – First 4 bits fixed, Multicast : [1110][ 28b ] Class E – First 4 bits fixed, Reserved for future use : [1111][ 28b ] |
|
IP Addresses are running out, how is this being mitigated?
|
NAT – Network Address Translation – Many computers share a few IP Addresses, requires a special router
Classless InterDomain Routing (CIDR) – Classful addressing has been mostly abandoned |
|
What is CIDR based on?
List the notation for CIDR. |
CIDR is based on Variable Length Subnet Masking (VLSM)
a.b.c.d/n where n specifies the network prefix length. (How many bits make up the network address.) |
|
Plaintext = ?
Ciphertext = ? |
Plaintext is the unencrypted, original message to be sent.
Ciphertext is the encrypted message to be sent. |
|
Cipher = ?
Key = ? |
Cipher – Algorithm to convert between plaintext and ciphertext
Key – Additional information needed as part of the cipher |
|
Encipher (encrypt) = ?
Decipher (decrypt) = ? |
Encipher (encrypt) – Convert plaintext to ciphertext
Decipher (decrypt) – Convert ciphertext to plaintex |
|
Cryptography = ?
Cryptanalysis = ? Cryptology = ? |
Cryptography – Developing ciphers
Cryptanalysis – Obtaining plaintext from ciphertext without the key Cryptology – Combined fields of cryptography and cryptanalysis. The study of ciphers in general |
|
Symmetric Key Cipher = ?
Public Key Cipher = ? |
Symmetric Key Cipher - The same key is used for both encryption and decryption
Public Key Cipher - Different keys are used for encryption and decryption |
|
Substitution ciphers = ?
Monoalphabetic Cipher = ? Polyalphabetic Cipher = ? |
Substitution Cipher – Replace characters with other characters
Monoalphabetic Cipher - Each time a character appears in plaintext, it is replaced with the same ciphertext character Polyalphabetic Cipher - A given plaintext character can be replaced in many different ways |
|
Transposition Ciphers = ?
|
Transposition Ciphers - Rearranging the plaintext characters without changing them otherwise
|
|
Concerning Cipher Security:
Computational security = ? Unconditional Security = ? |
Computational security – Can't be cracked in a reasonable amount of time without key (granted by modern ciphers)
Unconditional Security – Can't be cracked without the key at all (difficult to achieve practically) |
|
How does a Virus work?
How do viruses propagate? |
Viruses infect files or system areas.
Viruses propagate to other computers when files are transferred. |
|
What is a worm?
How do they propagate? |
Worms are standalone code.
Worms propagate through network vulnerabilities. |
|
What is a Trojan Horse?
How do they propagate? |
Trojan Horses masquerade as legitimate programs, but often open "backdoor" vulnerabilities in systems.
Trojan Horses do not propagate unless the file is transferred. |
|
What are the two phases of a virus?
What are the two types of viruses? |
Infection phase - Infect files & Execution phase - Do stuff (cause harm).
Boot sector virus - infects the boot sector of a disk. File virus - infects programs or data files. |
|
What are the ways viruses infect files?
|
Overwrite - just write over code.
Append - add code to the end of the program. Prepend - add code to the beginning of the program Cavity filling - fill in empty space of the program with virus code. |
|
What are the ways we can detect viruses?
What is a type of virus that can avoid some of these detections? |
File size changes - If a virus has infected a file, the file size will increase due to added code.
File checksum changes - a mathematical process to generate a unique code for a file, if a virus infects the file, this code will change. Signature-based detection - if we know viruses coding, we can check known viruses against files to see if they are infected. Polymorphic viruses change their form to avoid signature based detection. |