• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
Well Known Ports
FTP (TCP) - 21
SSH (TCP) - 22
Telnet (TCP) - 23
HTTP (TCP) - 80

Registered - range 1024 to 49151
Dynamic or private ports - 49152 to 65535
X.25 Protocol
Network data and physical layer of OSCI
Protocols used LAPB
PLP
Designed to operate over unreliable with physical and data link
Frame Relay
Forward frames and performs error checks only at end point.
Provides point to point connection by creating virtual circuit paths
Works on physical and data link layers
Operates on more reliable networks then X. 25
Virtual circuits 2 types
SVC - temporary VC for sporadic data transfer regulation and maintains only frame
PVC - permanent virtual connection. dedicated data transfer
Uses packet switched technology
Provides
IEEE 802.3
Preamble - binary data that informs receive stations that a frame is approaching. Start frame delineate. Sof - 1 byte binary info
Destination address - 6 bytes of
Source address - identity of sender
Length type - the number of the MAC - client data bytes presents

Data - 1500 bytes of information
Frame check sequence - 4 byte sequence used for cyclic redundancy check and missed frame detection
Packet Switched Networks
X.25 uses carrier switches that enable computers on different public networks to communicate. DTE and DCE
LAPB - Link access procedure balance. works with X.25. Retransmits, exchanges and acknowledges frames. Ensures frames are correctly sequenced and error free.
Frame Relay - upgrade from X.25 forward packets to destination without pinpacking at each node. Results in increased speed. Operates at physical and data link.
SMD5 - high speed data gram connectionless protocol
ATM - asynchronous transfer mode. Fixed cell size 53 bytes. High speed connection oriented use cell.
Remote Access Protocols
SLIP - serial line internet protoase. Encapsulates IP packet by apending special frames character. Only frames defines two special channels. end oct al 300 and ESC octal 333
PPP - point to point - serial link connection standard for assigning IP. Supports DEC net and IP exchange. Asynchronous and synchronous and process network protocol multiplexing. Callback, demand delay, scripting, multi link and filtering. Header compression, server routing, tunneling, extra encapsulation
CHAP - challenge handshake authentication protocol 1. Challenge to peer 2. has value 3. authenticator verifies sent value and acknowledge or based on the
PAP -password authentication protocol. Enable authentication over PPP ( 2 way handshake) 1. user puts in username and password. 2. link est credential send to authentication 3. authenticator verifies and creates or terminates not secure. Send credential through clear text
EAP - extensible authenticated protocol. framework that supports multiple authentication. Functions at data link.
SSH
Secure Shell (22)- protocol used to log on over network execute commands on remote computer and to move files from 1 computer to another.
The user decrypts the message sent by the host with public key
Secure tunnel between 2 computers. uses TCP 22.
The user authenticates host by encrypting a message with user public key.
Strong authentication and secure
Uses RSA for certificate exchange and 3 DES for session encryption.
Protects against: IP spoofing, spoofer on local network, IP source routing, DNS spoofing, interception data, man in middle, and session highacking
SSL
Secure Socket Layer - transport layer - provides privacy and reliability between two computer applications. 2 layers structure. encrypts data transmitted.

SSL - record protocol layer - is the lower layer. Layered on TCP and ensures data security and integrity
RC4 - 40 bits
SSL handshake - establishes SSL connection includes server and client mutual authentication and negotiation of an encryption algorithm and keys before the application protocol transmits.
Security features: Privacy (DES or RC4): reliability (MAC, MD5 or SHA)
TLS Protocol
IETF developed based on SSL 3.0. developed to provide standard for secure transmission over the world wide web.
Goal provide privacy and integrity. Provides HTTS for internet.
HTTPs encrypts data credential before transmistion
2 Layers - tLS handshake protocol layer establishes connection includes server and client mutual authentication and negotiatio of an encryption algorithm and keys. Authentication secure negotration of share secret and reliable.
TLS record layer - Lower layer on TCP. Connection symmetric encryption privacy reliable transport include MAC
Communication Types
Asynchronous - Sender can send data at anytime parity bit used randomly to provide error protection. Low transmission rates. Each character is delentaed with the use of a start and stop bit

Synchronous data - is transmitted in a stream of bits. Uses control bits only at the start and end of the entire transmission. Has low overhead. Communication takes place between two devices using clock.
Network Layer Protocols
IPsec - group forms extend to IP. Works at the network layer. Open, modular. Used to set up multiple simultaneous tunnels. Strong encryption and authentication 2 modes. 1 tunnel modes - payload and routing and header information for a packet are encrypted. 2. transport mode - payload is encrypted uses AH protocol, 96 bits long and forms a has of authentication token.
ESP protocol - authentication and encryption and confidentiality uses 3DES or IKE for key exchange. Creates secure tunnels through unsecured networks.
L2TP - Cisco L2F and Microsoft PTP. Strong authentication support multiple VPN protocols and unregistered and private IP and over multiple networks. Enable secure transport over multinetworks.
PPTP - individual client server connection to local ISP. Then secure VPN. Over IP networks only. Uses MS CHAP. Low cost connection via internet.
SKIP - siimple key management for IP provides security, authentication and registration. Uses Diffie Hellman 1024 bit public key for authentication. Encrypts using DES, RC2 and RC4. Similar to SSL but does not require prior communication. Enables certain of and large VPN beyond LAN and WAN
SWIPE - confidentiality, integrity and authentication. Provides end to end and intermediate hop security doesn't handle policy and key management.

Augments each packet with cryptology strong authenticator.
TCP/IP Protocols
TCP - host to host transport layer. Transport connection that ensures packets are i the correct format when they reach the destination complete uses 3 way handshake.
UDP - connectionless transport protocol does not guarantee packet ad has reached destination ad uses less resources and faster.
IP - network layer correction less protocol
TCP/IP Layers
Application layer - top layer interface to user. Converts received data into a user understandable form. (FTP, SNTP, Telnet, HTTP)
Transport Layer - use to transfer data between application controlling data transmission through the network layer. Transfer data between application uses UDP or TCP.
Internet Layer - heart of architecture. Handles the delivery of information from computer to other computers across networks. (ICMP)
Network Access - defines how the physical layer transmits packet between computers. Helps to convert data into bits. (ARP)
TCP and UDP
Transmission control Protocol
Full duplex connected oriented reliable. Sequenced reliable, high over head, slower
User Datagram Protocol best effort delivery - unsequeced, connectionless, unreliable, low overhead, faster.
IEEE Wireless Standards
802.11 2.4 Ghz 1 or 2 Mbps
a. 5 Ghz 54 Mbps
b. 2.4 Ghz up to 11 Mbps
g. 2.4 Ghz 20 to 54 Mbps
n. 5 Ghz 100 to 600 Mbps
Spanning Tree Protocol
Uses the STA to identify the best path to communicate with a node and any alternative path.
Email
Pretty Good Privacy - Phil Zimmerman 1991 MD5 has IDEA. Uses RSA private ad public. keys. Compresses data prior to encryption. Web of trust. Trust levels (untrusted, marginal complete ad ultimate. For a public key.
Privacy Enhance Mail - PEM, IETF, authorize MD2 ad MD5. Integrity. X.509 encryption (DES). Key management RSA. 7 bit text messages defies hierarchical structure and specification. Public key infrastructure. Highly structured and not compatible with MIME.
Secure MIME -provide secure method to send MIME confidentiality ad itegrity of message. RC2, DES, 3 DES, MD5, SHA, X. 509