• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/63

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

63 Cards in this Set

  • Front
  • Back
TCP/IP
Set of protocols used for different systems to communicate over a network.

Standard language for all parties involved.
4 Layers to TCP/IP Suite or DoD Model
4. Application Layer
3. Host-to-Host or Transport Layer
2. Internet Layer
1. Network Access Layer (also known as the Network Interface layer or the Link layer)
Host
Any device connected to the network that runs a TCP/IP protocol suite, or stack.

Ex. Laptop, Desktop, Smartphone, PDA, Printer, etc.
Application Layer
Highest layer of suite. It allows applications to access services or protocols to exchange data.

Application/Presentation/Session Layers
Commonly Used Application Protocol Layers
Hypertext Transfer Protocol (HTTP)
HTTP Secure (HTTPS)
File Transfer Protocol (FTP)
Simple Mail Transfer Protocol (SMTP)
Telnet
Domain Name System (DNS)
Routing Information Protocol (RIP)
Simple Network Management Protocol (SNMP)
Post Office Protocol (POP3)
Hypertext Transfer Protocol (HTTP)
(80) – web pages and urls
HTTP Secure (HTTPS)
(443) – secure web pages
File Transfer Protocol (FTP)
(20 and 21) – allows connections to ftp servers for file uploads/downloads.
Secure File Transfer Protocol (SFTP)
(115) – secure FTP
Simple Mail Transfer Protocol (SMTP)
SMTP (25) – standard for email communication (sending email)
Telnet
(23) – terminal emulation that allows remote users to access a client through a telnet server as if they were logged on locally, not secure because info is sent in plaintext
Domain Name System (DNS)
(53) – allows for hosts to resolve hostnames to IP addresses and vice versa. Ex. Google.com is associated with an IP address
Routing Information Protocol (RIP)
(520) – allows routing info to be exchanged between routers on a network
Simple Network Management Protocol (SNMP)
(161) – allows communication between network devices and a management console (routers, bridges, hubs use SNMP) by mapping the network
Post Office Protocol (POP3)
(110) – used to receive email
Host-to-Host Layer
Also called the Transport layer, provides the Application layer with session and datagram communications services.
Commonly used Host to Host Protocols
The Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
The Transmission Control Protocol (TCP)
Responsible for providing a reliable, one-on-one, connection-oriented session.

3 Way Handshake
User Datagram Protocol (UDP)
Provides an unreliable connection-less communication method between hosts.

Ex. Youtube
Internet Layer
Responsible for routing, IP addresses, and packaging.

Network Layer
Commonly used Internet Layer Protocols
Internet Protocol (IP) (IPv4, IPv6)
Address Resolution Protocol (ARP)
Internet Control Message Protocol (ICMP)
Internet Group Management Protocol (IGMP)
Internet Protocol (IP)
Responsible for IP addressing (routable addressing).
Address Resolution Protocol (ARP)
Resolving IP addresses to Network Access layer addresses (MAC addresses).
Internet Control Message Protocol (ICMP)
Maintenance and control functions – used by PING to test connectivity to hosts.
Internet Group Management Protocol (IGMP)
Managing IP multicast groups, sending messages to specified groups of hosts.
Network Access Layer
Responsible for placing and removing packets on the physical network through communications with the network adapters in the host.

Cabling and MAC addresses.


Data Link/Physical Layers
Encapsulation
Allows a transport protocol to be sent across the network and utilized by the equivalent service or protocol at the receiving host.

"Some services use both TCP and UDP ports"
Port
Special addresses that allow communication between hosts, end to end connections. Applications and services are associated with ports.

Is nothing more than a bit of additional information added to either the TCP or UDP message in the header of the packet.
Application Programming Interface (API)
Allow programmers to create interfaces to the protocol.
Security Topology
Defines the network design and implementation from a security perspective.
4 Primary Areas of Security Topology
1. Design Goals
2. Security Zones
3. Technologies
4. Business Requirements
Design Goals
Dealing with confidentiality, Payroll, integrity, availability, and accountability to ensure tighter security.

Ex. SSN, Payroll, Correct data, Data Accessibility, Responsibility.
Security Zone
Describes design methods that isolate systems from other systems or networks.
4 Common Security Zones
1. Internet
2. Intranet
3. Extranet
4. Demilitarized zone (DMZ)
Internet
It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless, and optical networking technologies.
Intranet
Generic term for a collection of private computer networks within an organization.
Extranet
Extension of intranet, mostly for allowing remote access to the network.
Demilitarized zone (DMZ)
Physical or logical sub-network that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet.
4 Newer Technologies
1. Virtualization
2. Virtual local area networks (VLANs)
3. Network Address Translation
4. Tunneling
Virtualization
VMWare, allowing you to run multiple items on one device as individual systems, without making changes to the actual device.
Virtual local area networks (VLANs)
Allows you to create users and system groups and segment them on a network. Used by switches reduces the size of broadcast domains, increases security.
Network Address Translation
Saved IPv4 addresses provides IP addresses to host systems in a network to access the internet using a single IP address.

Acts as a proxy, or boundary, between the LAN and the internet, allowing devices with private IP addresses access by issuing them public addresses.
Tunneling
Virtual connections between two systems or networks.

Encapsulating data in a mutually agreed protocol for transmission.
Infrastructure
Everything your organization is using, including computers, phones, and the physical layout.
Firewall
First line of defense in a network isolating one network from another.
Packet Filter Firewall
The packet filter doesn't analyze the data of a packet; it decides whether to pass it based on the packet's addressing information.
Proxy Firewall
Process requests from an outside network; the proxy firewall examines the data and makes rule-based decisions about whether the request should be forwarded or refused.

Increased intelligence also offering caching.
Stateful Inspection Firewall
Records are kept using state table that tracks every communications channel.

Occurs at all levels of the network provides additional security for connectionless protocols (UDP and ICMP).

"Vulnerable to DoS attacks due to flooding state table"
Hub
Dumb device. No intelligence.
Modem
Converts analog to digital and vice versa computer to telephone line.
Remote Access Service (RAS)
Any server service that offers the ability to connect remoter systems.

Dial-up, VPNs, ISDN, DSL, and cable modems.
Router
Instrument used to for connectivity between 2 or more networks.
Routing Protocols
Routing Information Protocol (RIP)
Border Gateway Protocol (BGP)
Open Shortest Path First (OSPF)
Switch
Makes forwarding decisions to get packets to their destination based on MAC addresses in its MAC table.
Load Balancer
Distribute work loads.
Telecom/PBX System
Phone system that allows you to have less phone numbers (like NAT, except with phone numbers).
Virtual Private Networks (VPN)
Created using tunneling (encapsulation. inside encapsulation).
Web Security Gateway
Thought of as a proxy server with web protection software built in.

Real time protection and analysis.

Can detect/prohibit include inappropriate content.

Block known HTTP/HTML exploits, strip Active X tags, strip Java applets, and block/strip cookies.
Spam Filter
Filtering out unsolicited emails.
Tunneling Protocols
Point –to-point Protocol (PPP)
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Forwarding (L2F)
Layer 2 Tunneling Protocol (L2TP)
Secure Shell (SSH)
Point –to-point Protocol (PPP)
1994 Offers support for multiple protocols works with POTS, ISDN, T1.

Doesnt provide data security but authenticates using CHAP.
Secure Shell (SSH)
Uses encryption to establish a secure connection between 2 systems.
Internet Protocol Security (IPSec)
Isn't a tunneling protocol, but is used in conjunction with tunneling protocols.

Provide encryption for either the header AND the data (tunneling mode) or just the data (transport mode).