Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
63 Cards in this Set
- Front
- Back
TCP/IP
|
Set of protocols used for different systems to communicate over a network.
Standard language for all parties involved. |
|
4 Layers to TCP/IP Suite or DoD Model
|
4. Application Layer
3. Host-to-Host or Transport Layer 2. Internet Layer 1. Network Access Layer (also known as the Network Interface layer or the Link layer) |
|
Host
|
Any device connected to the network that runs a TCP/IP protocol suite, or stack.
Ex. Laptop, Desktop, Smartphone, PDA, Printer, etc. |
|
Application Layer
|
Highest layer of suite. It allows applications to access services or protocols to exchange data.
Application/Presentation/Session Layers |
|
Commonly Used Application Protocol Layers
|
Hypertext Transfer Protocol (HTTP)
HTTP Secure (HTTPS) File Transfer Protocol (FTP) Simple Mail Transfer Protocol (SMTP) Telnet Domain Name System (DNS) Routing Information Protocol (RIP) Simple Network Management Protocol (SNMP) Post Office Protocol (POP3) |
|
Hypertext Transfer Protocol (HTTP)
|
(80) – web pages and urls
|
|
HTTP Secure (HTTPS)
|
(443) – secure web pages
|
|
File Transfer Protocol (FTP)
|
(20 and 21) – allows connections to ftp servers for file uploads/downloads.
|
|
Secure File Transfer Protocol (SFTP)
|
(115) – secure FTP
|
|
Simple Mail Transfer Protocol (SMTP)
|
SMTP (25) – standard for email communication (sending email)
|
|
Telnet
|
(23) – terminal emulation that allows remote users to access a client through a telnet server as if they were logged on locally, not secure because info is sent in plaintext
|
|
Domain Name System (DNS)
|
(53) – allows for hosts to resolve hostnames to IP addresses and vice versa. Ex. Google.com is associated with an IP address
|
|
Routing Information Protocol (RIP)
|
(520) – allows routing info to be exchanged between routers on a network
|
|
Simple Network Management Protocol (SNMP)
|
(161) – allows communication between network devices and a management console (routers, bridges, hubs use SNMP) by mapping the network
|
|
Post Office Protocol (POP3)
|
(110) – used to receive email
|
|
Host-to-Host Layer
|
Also called the Transport layer, provides the Application layer with session and datagram communications services.
|
|
Commonly used Host to Host Protocols
|
The Transmission Control Protocol (TCP)
User Datagram Protocol (UDP) |
|
The Transmission Control Protocol (TCP)
|
Responsible for providing a reliable, one-on-one, connection-oriented session.
3 Way Handshake |
|
User Datagram Protocol (UDP)
|
Provides an unreliable connection-less communication method between hosts.
Ex. Youtube |
|
Internet Layer
|
Responsible for routing, IP addresses, and packaging.
Network Layer |
|
Commonly used Internet Layer Protocols
|
Internet Protocol (IP) (IPv4, IPv6)
Address Resolution Protocol (ARP) Internet Control Message Protocol (ICMP) Internet Group Management Protocol (IGMP) |
|
Internet Protocol (IP)
|
Responsible for IP addressing (routable addressing).
|
|
Address Resolution Protocol (ARP)
|
Resolving IP addresses to Network Access layer addresses (MAC addresses).
|
|
Internet Control Message Protocol (ICMP)
|
Maintenance and control functions – used by PING to test connectivity to hosts.
|
|
Internet Group Management Protocol (IGMP)
|
Managing IP multicast groups, sending messages to specified groups of hosts.
|
|
Network Access Layer
|
Responsible for placing and removing packets on the physical network through communications with the network adapters in the host.
Cabling and MAC addresses. Data Link/Physical Layers |
|
Encapsulation
|
Allows a transport protocol to be sent across the network and utilized by the equivalent service or protocol at the receiving host.
"Some services use both TCP and UDP ports" |
|
Port
|
Special addresses that allow communication between hosts, end to end connections. Applications and services are associated with ports.
Is nothing more than a bit of additional information added to either the TCP or UDP message in the header of the packet. |
|
Application Programming Interface (API)
|
Allow programmers to create interfaces to the protocol.
|
|
Security Topology
|
Defines the network design and implementation from a security perspective.
|
|
4 Primary Areas of Security Topology
|
1. Design Goals
2. Security Zones 3. Technologies 4. Business Requirements |
|
Design Goals
|
Dealing with confidentiality, Payroll, integrity, availability, and accountability to ensure tighter security.
Ex. SSN, Payroll, Correct data, Data Accessibility, Responsibility. |
|
Security Zone
|
Describes design methods that isolate systems from other systems or networks.
|
|
4 Common Security Zones
|
1. Internet
2. Intranet 3. Extranet 4. Demilitarized zone (DMZ) |
|
Internet
|
It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless, and optical networking technologies.
|
|
Intranet
|
Generic term for a collection of private computer networks within an organization.
|
|
Extranet
|
Extension of intranet, mostly for allowing remote access to the network.
|
|
Demilitarized zone (DMZ)
|
Physical or logical sub-network that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet.
|
|
4 Newer Technologies
|
1. Virtualization
2. Virtual local area networks (VLANs) 3. Network Address Translation 4. Tunneling |
|
Virtualization
|
VMWare, allowing you to run multiple items on one device as individual systems, without making changes to the actual device.
|
|
Virtual local area networks (VLANs)
|
Allows you to create users and system groups and segment them on a network. Used by switches reduces the size of broadcast domains, increases security.
|
|
Network Address Translation
|
Saved IPv4 addresses provides IP addresses to host systems in a network to access the internet using a single IP address.
Acts as a proxy, or boundary, between the LAN and the internet, allowing devices with private IP addresses access by issuing them public addresses. |
|
Tunneling
|
Virtual connections between two systems or networks.
Encapsulating data in a mutually agreed protocol for transmission. |
|
Infrastructure
|
Everything your organization is using, including computers, phones, and the physical layout.
|
|
Firewall
|
First line of defense in a network isolating one network from another.
|
|
Packet Filter Firewall
|
The packet filter doesn't analyze the data of a packet; it decides whether to pass it based on the packet's addressing information.
|
|
Proxy Firewall
|
Process requests from an outside network; the proxy firewall examines the data and makes rule-based decisions about whether the request should be forwarded or refused.
Increased intelligence also offering caching. |
|
Stateful Inspection Firewall
|
Records are kept using state table that tracks every communications channel.
Occurs at all levels of the network provides additional security for connectionless protocols (UDP and ICMP). "Vulnerable to DoS attacks due to flooding state table" |
|
Hub
|
Dumb device. No intelligence.
|
|
Modem
|
Converts analog to digital and vice versa computer to telephone line.
|
|
Remote Access Service (RAS)
|
Any server service that offers the ability to connect remoter systems.
Dial-up, VPNs, ISDN, DSL, and cable modems. |
|
Router
|
Instrument used to for connectivity between 2 or more networks.
|
|
Routing Protocols
|
Routing Information Protocol (RIP)
Border Gateway Protocol (BGP) Open Shortest Path First (OSPF) |
|
Switch
|
Makes forwarding decisions to get packets to their destination based on MAC addresses in its MAC table.
|
|
Load Balancer
|
Distribute work loads.
|
|
Telecom/PBX System
|
Phone system that allows you to have less phone numbers (like NAT, except with phone numbers).
|
|
Virtual Private Networks (VPN)
|
Created using tunneling (encapsulation. inside encapsulation).
|
|
Web Security Gateway
|
Thought of as a proxy server with web protection software built in.
Real time protection and analysis. Can detect/prohibit include inappropriate content. Block known HTTP/HTML exploits, strip Active X tags, strip Java applets, and block/strip cookies. |
|
Spam Filter
|
Filtering out unsolicited emails.
|
|
Tunneling Protocols
|
Point –to-point Protocol (PPP)
Point-to-Point Tunneling Protocol (PPTP) Layer 2 Forwarding (L2F) Layer 2 Tunneling Protocol (L2TP) Secure Shell (SSH) |
|
Point –to-point Protocol (PPP)
|
1994 Offers support for multiple protocols works with POTS, ISDN, T1.
Doesnt provide data security but authenticates using CHAP. |
|
Secure Shell (SSH)
|
Uses encryption to establish a secure connection between 2 systems.
|
|
Internet Protocol Security (IPSec)
|
Isn't a tunneling protocol, but is used in conjunction with tunneling protocols.
Provide encryption for either the header AND the data (tunneling mode) or just the data (transport mode). |