Term
| What is meant by Cloud file synch/ distribution? |
|
Definition
| It means that a powerpoint or any file can be acessed from any device ( home tablet, home desktop, office labtop, etc) |
|
|
Term
| Why is the cloud, called the cloud? ( What does the imagery represent? |
|
Definition
| That the user foes not have to understand how systems "inside the cloud" operate. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Relative signal strength, higher the better |
|
|
Term
| What would a BSSID number look like? |
|
Definition
|
|
Term
| What would a signal look like? |
|
Definition
|
|
Term
| What would a mode number look like? |
|
Definition
|
|
Term
| Was would an encryption code look like? |
|
Definition
|
|
Term
| What would an authenticitation number look like? |
|
Definition
|
|
Term
|
Definition
| A network is a system that permits networked applications running on different hosts to work together. |
|
|
Term
|
Definition
| The network core is depicted as a cloud to emphasize that users do not have to know what goes on inside the network core. |
|
|
Term
| What connects hosts to the network? |
|
Definition
|
|
Term
| Any device attached to a network is a ____. |
|
Definition
|
|
Term
| What are some examples of a host? |
|
Definition
| large servers, small desktops, laptops, netbooks, smart phones, and tablets. |
|
|
Term
| How do hosts communicate? |
|
Definition
| By sending messages addressed to the destination host. |
|
|
Term
| The client program sends a _____ message, and the server program sends a ______ message. |
|
Definition
| The client program sends a request message, and the server sends a response message. |
|
|
Term
| The client and the server share |
|
Definition
|
|
Term
| This type of processing can be done without a network or with a network. No servers are needed. |
|
Definition
|
|
Term
| what does bps stand for? What is the hierachy in transmission speed? |
|
Definition
Bits per second kbps = 1000 bps Gbps = 1000 Mbps Tbps = 1000 Gbps |
|
|
Term
|
Definition
| Means it is fairly constant use. Paying by the minute is fairly efficient. |
|
|
Term
| What is meant by data burstiness? |
|
Definition
| In a two way transmission , one side is transmitting, and the other is not. |
|
|
Term
|
Definition
| Short bursts of data, with long silences needed. High speeds needed. |
|
|
Term
| What is meant by packet switching and multiplexing? |
|
Definition
1.) Original message is fragmented into packets on the source host. 2.) Packets are sent individually through the network. 3.) If a packet is lost, only that packet needs to be resent, not the entire application message. |
|
|
Term
| Packets of different conversations are ________ , reducing the cost per conversation. |
|
Definition
|
|
Term
| What is meant by sequential switching decisions? |
|
Definition
| When packet switch A receives a packet addressed to Destination Host Y. It must make a forwarding decision, which means sending the packet to switch B or C. |
|
|
Term
| True or false: A packet switch does not know the packets entire path through the network, it only knows the next step. |
|
Definition
|
|
Term
| How do switches make decisions on where to send the packet? |
|
Definition
| It is based on the switching table. |
|
|
Term
| What do physical links do? |
|
Definition
| They connect adjacent devices. |
|
|
Term
|
Definition
| The data link is the packets entire path through the network. |
|
|
Term
| What was the forerunner of the internet? |
|
Definition
|
|
Term
| How was the internet birthed? |
|
Definition
Bob Kahn needed a way for researchers on one network to use resources on another network. Packets would have to travel across multiple networks. Kahn came up with the idea of connecting multiple networks by devices called routers. |
|
|
Term
|
Definition
| They connect single networks into an internet |
|
|
Term
| What is the different between Single networks and Internets based on what packets are called, what packet switches are called, and what end to end routes are as well as addresses? |
|
Definition
The single network address varies by network technology, packets are called frames, packet switches are called switches, and end to end routes are called data links.
Internets addresses are 32 bit IPv4 addresses and 128 bit IPv6 addresses. Packets are called packets, packet switches are called routers, and end to end routes are called routes. |
|
|
Term
| In an internet, a single packet goes all the way from the ____ host to the ______ host. |
|
Definition
|
|
Term
| In each single network along the way, a ____ is carried in a different ____. |
|
Definition
|
|
Term
|
Definition
| The packet's path through the network. Example X-A-B-D-F-Y |
|
|
Term
| What is the NWG( Network working group)? |
|
Definition
- Formed by students to create standards for the ARPANET - Called their standards RFCs - NWG evolved into today's standards body for the internet. - Internet standards today are still called RFC's |
|
|
Term
|
Definition
| a packets path through the internet. |
|
|
Term
| What is meant by the transport layer? |
|
Definition
-End to End ( host to host) - Packet assembly and disassemby with TCP - Error correction, packet sequencing, and congestion control with TCP |
|
|
Term
| What are the five networking layers, in order? |
|
Definition
5) application 4) Transport 3) Internet 2) Data link 1) physical |
|
|
Term
|
Definition
Internet layer protocol - Unreliable best-effort internet layer operation. |
|
|
Term
|
Definition
- Transport layer protocol - TCP messages are called segments - Provides transport layer functionality to fix problems. - error correction, and so on. |
|
|
Term
|
Definition
- The other transport layer protocol - Messages are called datagrams - Unreliable, so used when reliability is not desired. |
|
|
Term
|
Definition
| Internet service provider. To use the internet you need an ISP and an access line to your ISP. Your USP gives you access and carries your packets. |
|
|
Term
|
Definition
| ISPS collectively comprise the internet backbone. They interconnect at network access points ( NAPs) to exchange packets. |
|
|
Term
| What are some standards for delivery packets? |
|
Definition
|
|
Term
| TCP/IP also has supervisory protocols. What do they do? |
|
Definition
- To handle things beyond packet delivery. - Managing IP addresses - error handling, and so on - e.g. DHCP and DNS |
|
|
Term
| What is an example of a DHCP request message between a client PC that needs a dynamic IP address, and a DHCP server? |
|
Definition
| DHCP request message: My network address is F102A. Please give me a 32 bit IP address. |
|
|
Term
| What is an example of a DHCP response message? ( From DHCP server to Client PC) |
|
Definition
| "Your 32 bit IP address is... here is additional configuration information. The IP address of your default router, the IP addresses of your DNS servers. |
|
|
Term
| What does the DNS first must do? |
|
Definition
| The originating host wants to send packets to a website, it must learn their IP address to send it packets. |
|
|
Term
| What is an example of a DNS request message? |
|
Definition
| "the host name for this website is 128.171.17.13 |
|
|
Term
| What does the wireless access router do? |
|
Definition
| The IP gives the home on IP address. The home network has multiple devices that need IP addresses. |
|
|
Term
| What does the access router DHCP circuit do? |
|
Definition
| it gives private IP addresses to other devices. |
|
|
Term
| What does NAT allow things to do? |
|
Definition
| It allows multiple internal hosts to share a single external IP address. External sniffers cannot learn internal addresses. |
|
|
Term
| What are the five layers of the internet? |
|
Definition
| Application, Transport, Internet, Data Link, Physical. |
|
|
Term
|
Definition
| Standards allow different systems to work together. |
|
|
Term
| What does the term standard also mean? |
|
Definition
|
|
Term
| What do network standards do? |
|
Definition
Govern message semantics, syntax, order, reliability, and format. They also permit interoperability among vendors. It also creates competition Encourages growth in functionality. |
|
|
Term
| A data link is the path from the ___ to the ____. And the Route is the path from the ____ to the _____. |
|
Definition
data link: host to router. Route: From source host , through the router, to the destination host. |
|
|
Term
| What are the broad functions of the layers? |
|
Definition
Application- Interoperability of application programs Transport/ internet - transmission across an internet. Data Link/ Physical - Transmission across a single switched or wireless network. |
|
|
Term
| What are network standards? |
|
Definition
| rules that govern the exchange of messages between hardware or software processes on different hosts, including messages, reliability, and connection orientation. |
|
|
Term
| What are some important points about the message order? |
|
Definition
- They take turns ( think of telephone conversations) - Order of messages in a complex transaction. - Who must initiate communication, and so on. |
|
|
Term
| What is meant by reliable? |
|
Definition
- A reliable protocol both detects and corrects errors during transmission. - error detection alone is not enough - some unreliable protocols detect errors but then only drop incorrect messages. |
|
|
Term
| What is the message order in HTTP? |
|
Definition
| in http, the client program initiates the communication by sending an HTTP request message to the webserver program. |
|
|
Term
| What happens after the client pc sends a http request message? |
|
Definition
| the webserver program sends an http response message back. The webserver program may not transmit until it receives an http request message. |
|
|
Term
|
Definition
connectionless. Every request response cycle is independent. |
|
|
Term
|
Definition
connection oriented. - there is a formal opening of the connection. - Within the connection, messages are sequenced, acknowledged, and retransmitted if necessary. - there is a formal closing of the connection. |
|
|
Term
| A connection opening requires ____ segments. |
|
Definition
three. - SYN request - SYN/ ACK - ACK |
|
|
Term
| What is the order of an http request? |
|
Definition
| HTTP request, ACK, Data = http response, ACK |
|
|
Term
| What happens to HTTP requests that are unacknowledged? |
|
Definition
|
|
Term
| How many messages close a connection? |
|
Definition
| four -> FIN , <---Ack, <--- Data, ----> ACK, <---- FIN, --->ACK |
|
|
Term
| What does semantics mean? |
|
Definition
| the meaning of a message. |
|
|
Term
| What are the semantics behinds an http request message, http response message, http get request, and http put request? |
|
Definition
http request- please give me this file. http response - here is the file, or i could not comply for the following reason. http get- please give me this file http put- store this file. |
|
|
Term
| In general, messages have what three parts? |
|
Definition
| trailer, data field, and header. |
|
|
Term
| What does the data field, header, and trailer contain? |
|
Definition
- the data field contains the content being delivered. - the header is everything before the data field. the trailer is everything after the data field. |
|
|
Term
|
Definition
- broken into smaller segments called header fields. - there is often an address field to indicate where to deliver the message. |
|
|
Term
| true or false: Most messages do not have trailers. |
|
Definition
|
|
Term
| Field lengths may be measured in ___ or ___. |
|
Definition
| bits or bytes. Another name for a byte is octet. |
|
|
Term
| True or false: Some messages do not have data fields. |
|
Definition
| true. Example: Some TCP SYN segments only have headers. |
|
|
Term
|
Definition
Dominant version of IP on the internet today - 32 bit IP addresses - more than 4 billion possible addresses. - handed out inefficiently, few available. |
|
|
Term
|
Definition
128 bit addresses should give an inexhaustible supply - new syntax for ip packets. |
|
|
Term
| What does the sequence number field give? |
|
Definition
| the TCP segment's order in the session. |
|
|
Term
| What does the acknowledgement number field indicate? |
|
Definition
| indicates the segment that this segment is acknowledging. |
|
|
Term
|
Definition
| 1 bit fields. If the value is one, the flag field is set. If the flag field is 0, the flag field is not set. Flag bits are SYN, ACK, FIN and RST/ TCP has six flag fields. |
|
|
Term
| What is the TCP checksum field? |
|
Definition
for error correction. - The sender computes the value in the field. - If the receiver computes the same value, it sends an ACK. - If not, the receiver discards the segment and sends nothing. the sender will resend the segment. TCP is reliable. |
|
|
Term
|
Definition
- the always have headers - some TCP segments do not have data fields. - some TCP segments do not have data fields. - Supervisory segments do not carry data because the information to be conveyed delivers no data. - TCP segments NEVER have trailers. |
|
|
Term
|
Definition
| IP's have headers, a data field, but never have a trailer. |
|
|
Term
| What is the UDP checksum? |
|
Definition
the udp checksum is for error detection. If there is an error, udp discards the datagram. - if no error is detected, it accepts the datagram but does not send the ACK. |
|
|
Term
| Both TCP and UDP headers begin with a ____ port number and a _____ port number field. |
|
Definition
|
|
Term
| What type of port numbers do SMTP, HTTP, and FTP applications have? |
|
Definition
SMTP- port 25 HTTP - Port 80 FTP- Ports 20 and 21 - each app is assigned a port number |
|
|
Term
| Major applications usually are given well known port numbers ranging from : |
|
Definition
|
|
Term
| What does the second line of a Http get request specify? |
|
Definition
| it specifies to the host to receive this http request message. |
|
|
Term
|
Definition
- Applications must convert application message into bits. - this is necessary because all lower layers have fields consisting only of ones and zeros. - this is called encoding. |
|
|
Term
| From the source host, what is the order of a message sent through one cliet, to a host? |
|
Definition
1.) Encapsulation of http message in a data field of TCP segment. 2.) Encapsulation of TCP segment in data field of an IP packet ( internet layer ). 3.) Encapsulation of IP packet in data field of ethernet frame. 4.) Conversion of bits into outgoing signals. |
|
|
Term
| What are the two major standard architectures? |
|
Definition
|
|
Term
|
Definition
| divides the internet into 7 layers ( Application, presentation, session, transport, network, data link, physical. |
|
|
Term
| What is the most dominant architecture? |
|
Definition
|
|
Term
| Security is primarily a _____ issue, not a ______ issue. |
|
Definition
|
|
Term
| You cannot defend yourself unless you know the _____ ______ you face. |
|
Definition
|
|
Term
| How do companies defend themselves? |
|
Definition
| the Plan- Portect- respond cycle. |
|
|
Term
|
Definition
| a general name for evil software. |
|
|
Term
| What is meant by vulnerability? |
|
Definition
Vulnerabilities are securit flaws in specific programs. - specific malware requires a specific vulnerability to be effective. - Universal malware does not require a specific vulnerability to be effective. |
|
|
Term
| Peices of code that attach themselves to other programs are ____. |
|
Definition
viruses. - virus code executes when an infected programs executes. The virus then infects other programs on the computer. |
|
|
Term
| Stand alone programs that don't need to attach to other programs are: |
|
Definition
worms. - can propagate like viruses through email - directly propagating worms jump to victim hosts directly. |
|
|
Term
| what are scripts/ mobile code? |
|
Definition
HTML web pages can contain scripts. - these are snippets of code in a simplified programming language that are executed when the webpage is in a browser. - scripts are called mobile code because they are downloaded within the webpage. |
|
|
Term
| A firewall stops _____, and worms are stoped by _____ |
|
Definition
| firewall stops worms, viruses are stopped by antivirus. |
|
|
Term
| What are three attacks on individuals? |
|
Definition
Social Engineering ( tricking the victim into doing something against their interest) - Fraud ( Lying to the user to get the user to do something against his or her financial self interest) Spam ( unsolicited commercial email, often used for fraud) |
|
|
Term
| What are two other attacks on individuals? |
|
Definition
- including a link to a website that has malware. -phishing attacks- when a legit looking website ask you for username, password, etc. |
|
|
Term
| What is a human break in? |
|
Definition
Hacking - informally hacking is breaking into a computer or system. - formally, hacking is intentionally using a computer resource without authorization or in excess of authorization. |
|
|
Term
| What are the stages in a human break in? |
|
Definition
-scanning phase - the break in - after the break in |
|
|
Term
|
Definition
| pings that identify active IP addresses and therefore potential victims. |
|
|
Term
| What does a second round probe attack do? |
|
Definition
| second round send packets to ports on identified potential victims to identify applications. |
|
|
Term
| What is associated with the break in? |
|
Definition
- uses an exploit- a tailored attack method that is often a program. - normally exploits a vulnerability on the victim computer. |
|
|
Term
| What happens after the break in? |
|
Definition
1.) The hacker downloads a hacker tool kit to automate hacking work. 2.) The hacker becomes invisible by deleting log files. 3.) the hacker creates a computer backdorr ( way to get back into the computer ). Backdoor account - account with a known password and full priveleges. - backdoor program- program to allow reentry; usually trojanized. |
|
|
Term
|
Definition
| its when an attacker sends attack commands to bots. Bots then attack victims. |
|
|
Term
| What are some types of hackers? |
|
Definition
- traditional hackers ( driven by curiousity, desire for power, peer reputation. - Malware writers - it is usually not a crime to write malware - it is almost always a crime to release malware. script kiddies- use attack scripts written by experienced hackers and virus writers. disgruntled employees and ex employees - steal money and trade secrets, and sabotage systems |
|
|
Term
| What is a criminal attacker? |
|
Definition
- most attackers are now criminal attackers. - attackers with traditional motives are now a small and shrinking minority. - large and complex black markets for attack programs, attacks - for - hire services, bot rentals and sales, money laundering,etc. |
|
|
Term
| What are the planning principles? |
|
Definition
Risk analysis comprehensive security defense in depth minimum permissions. |
|
|
Term
|
Definition
the process of balancing threat and protection costs for individual assets. - annual cost of protection should not exceed the expected annual damage. |
|
|
Term
| What is comprehensive security? |
|
Definition
- an attacker only has to find one weakness to succeed. - a firm needs to close off all avenues of attack ( comprehensive security). |
|
|
Term
| What is defense in depth? |
|
Definition
- every protection breaks down sometimes. - the attacker should have to break through several lines of defense to succeed. - even if one protection breaks down, the attack will not succeed. |
|
|
Term
| What are minimum permissions? |
|
Definition
| - people should be given minimum permissions- the least that they need to do their jobs- so that they cannot do unauthorized things. |
|
|
Term
| Planners do what? and implementers do what? |
|
Definition
planners create policies, which specify what to do, but now how to do it. implementers implement policies with local and technical expertise. |
|
|
Term
|
Definition
|
|
Term
| What does the process of authentication look like? |
|
Definition
| the supplicant proves its identity to the verifier by sending its credentials ( proofs of identity, password, etc) and the verifier accepts or rejects it. |
|
|
Term
| What are hybrid dictionary attacks? |
|
Definition
- look for common variations of names and words. - capitalizing only the first letter, ending with a single digit, etc. Passwords that can be cracked with hybrid dictionary attacks are never adequately strong, regardless of how long they are. |
|
|
Term
| Passwords should be ____ and ____ |
|
Definition
|
|
Term
| reusable passwords are too ____ to be used for high security today. |
|
Definition
|
|
Term
| What is meant by perspective? |
|
Definition
| goal is to eliminate reusable passwords. |
|
|
Term
|
Definition
permit door access - proximity access cards do not require physical scanning. - need to control distribution and disable lost or stolen cards. |
|
|
Term
|
Definition
| use body measurements to authencitate you. |
|
|
Term
|
Definition
| group of protections based on mathematics. |
|
|
Term
| Encryption methods are called ___, not ____ |
|
Definition
|
|
Term
| The receiver decypts with the same ___ and ____ key |
|
Definition
|
|
Term
| A single key is used to ____ and ____ in both directions |
|
Definition
|
|
Term
| ____ _____ give message authentication and message integrity. |
|
Definition
|
|
Term
|
Definition
| cryptographic system standard widely used in sensitive browser-webserver communication |
|
|
Term
|
Definition
protects packets and all of their embedded contents. - automatically protects all applications |
|
|
Term
| What is digital certificate authentication? |
|
Definition
- strongest form of authentication. - two components 1.) everyone has a private key only he or she knows 2.) Everyoe also has a non secret public key. |
|
|
Term
| What are digital certificate authentication? |
|
Definition
components - public keys are available in unalterable digital certificates - digital certificates are provided by trusted certificate authorities. |
|
|
Term
| What does the process of digital certificate authenctication look like? |
|
Definition
1.) Supplicant claims to be someone ( true party ) 2.) Calculation using supplicants private key. 3.) Certificate authority provides digital certificate of true party. 4.) Certificate contains public key of true party. |
|
|
Term
| Where does the verifier get the public key of the true party? |
|
Definition
| from the true party's digital certificate |
|
|