• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
The internet is made up of millions of _____ and _____
Hosts and Routers
The internet is a network of networks.
Tier-1 ISPs control the internet backbone (the core routers)
Lower tier ISPs _______
Pay higher tier ISP for internet access and provide access to end users.
Delivery of data on the internet is governed by protocol layers.
TCP and UDP are part of ______ layer
Transport Layer Protocols– control main Host-to-host data transfer
Delivery of data on the internet is governed by protocol layers.
FTP, HTTP, SMTP are part of _____ layer
Application Layer – Supports network applications
Delivery of data on the internet is governed by protocol layers.
IP addresses are part of _____ layer
Network Layer – Supports routing of data
Delivery of data on the internet is governed by protocol layers.
Ethernet connections are part of ________ layer.
Link Layer – Communication between adjacent network elements (computer - computer, computer - router, etc)
Delivery of data on the internet is governed by protocol layers.
Wire voltages & radio signals are part of ______ layer.
Physical Layer – The "bits on the wire", the actual connections
IP - Internet Protocol - is concerned with _________
Concerned with routing data from host to host across the internet
Classful addressing - list each class and it's structure
Class A – First 1 bit fixed, 7 bits for network, 24 bits for host : [1][ 7b ][ 24b ]

Class B – First 2 bits fixed, 14 bits for network, 16 bits for host : [10][ 14b ][ 16b ]
Class C – First 3 bits fixed, 21 bits for network, 8 bits for host : [110][ 21b ][ 8b ]
Class D – First 4 bits fixed, Multicast : [1110][ 28b ]
Class E – First 4 bits fixed, Reserved for future use : [1111][ 28b ]
IP Addresses are running out, how is this being mitigated?
NAT – Network Address Translation – Many computers share a few IP Addresses, requires a special router
Classless InterDomain Routing (CIDR) – Classful addressing has been mostly abandoned
What is CIDR based on?
List the notation for CIDR.
CIDR is based on Variable Length Subnet Masking (VLSM)

a.b.c.d/n where n specifies the network prefix length. (How many bits make up the network address.)
Plaintext = ?
Ciphertext = ?
Plaintext is the unencrypted, original message to be sent.
Ciphertext is the encrypted message to be sent.
Cipher = ?
Key = ?
Cipher – Algorithm to convert between plaintext and ciphertext

Key – Additional information needed as part of the cipher
Encipher (encrypt) = ?
Decipher (decrypt) = ?
Encipher (encrypt) – Convert plaintext to ciphertext

Decipher (decrypt) – Convert ciphertext to plaintex
Cryptography = ?
Cryptanalysis = ?
Cryptology = ?
Cryptography – Developing ciphers

Cryptanalysis – Obtaining plaintext from ciphertext without the key

Cryptology – Combined fields of cryptography and cryptanalysis. The study of ciphers in general
Symmetric Key Cipher = ?
Public Key Cipher = ?
Symmetric Key Cipher - The same key is used for both encryption and decryption

Public Key Cipher - Different keys are used for encryption and decryption
Substitution ciphers = ?
Monoalphabetic Cipher = ?
Polyalphabetic Cipher = ?
Substitution Cipher – Replace characters with other characters

Monoalphabetic Cipher - Each time a character appears in plaintext, it is replaced with the same ciphertext character

Polyalphabetic Cipher - A given plaintext character can be replaced in many different ways
Transposition Ciphers = ?
Transposition Ciphers - Rearranging the plaintext characters without changing them otherwise
Concerning Cipher Security:
Computational security = ?
Unconditional Security = ?
Computational security – Can't be cracked in a reasonable amount of time without key (granted by modern ciphers)

Unconditional Security – Can't be cracked without the key at all (difficult to achieve practically)
How does a Virus work?
How do viruses propagate?
Viruses infect files or system areas.

Viruses propagate to other computers when files are transferred.
What is a worm?
How do they propagate?
Worms are standalone code.

Worms propagate through network vulnerabilities.
What is a Trojan Horse?
How do they propagate?
Trojan Horses masquerade as legitimate programs, but often open "backdoor" vulnerabilities in systems.

Trojan Horses do not propagate unless the file is transferred.
What are the two phases of a virus?
What are the two types of viruses?
Infection phase - Infect files & Execution phase - Do stuff (cause harm).

Boot sector virus - infects the boot sector of a disk.
File virus - infects programs or data files.
What are the ways viruses infect files?
Overwrite - just write over code.
Append - add code to the end of the program.
Prepend - add code to the beginning of the program
Cavity filling - fill in empty space of the program with virus code.
What are the ways we can detect viruses?

What is a type of virus that can avoid some of these detections?
File size changes - If a virus has infected a file, the file size will increase due to added code.
File checksum changes - a mathematical process to generate a unique code for a file, if a virus infects the file, this code will change.
Signature-based detection - if we know viruses coding, we can check known viruses against files to see if they are infected.

Polymorphic viruses change their form to avoid signature based detection.