01 - Flash Cards
1
Q
Tunneling
A
- Encapsulation of protocol-deliverable message within a second protocol.
2
Q
Transmission Control Protocol/Internet Protocol
A
- Communication protocols used to interconnect network devices on the internet. They can also be used for intranet or extranet.
3
Q
IPSec
A
- Is is a secure network protocol suite that authenticates and encrypts the packets of data sent over an internet.
4
Q
Kerberos
A
- It is a computer network authentication protocol developed by MIT that offers sign on solution for users and provides protection for logon credentials.
5
Q
SSH
A
- Secure Shell is an end to end encryption technique that can be used to encrypt plaintext utilities as well as to serve as protocol encryption and VPN.
6
Q
Signal Protocol
A
- Protocol that provides end to end encryption for voice and text messages.
7
Q
Secure Remote Procedure Call
A
- An authentication service meant to prevent unauthorized code use on remote services.
8
Q
Secure Socket Layer
A
- It is a cryptographic protocol designed to provide communications security over a computer network – between a web server and a web browser.
9
Q
Transport Layer Security
A
- It is a cryptographic protocol designed to provide communications security over a computer network – between a web server and a web browser.
- It is similar to SSL but uses stronger authentication and encryption.
10
Q
List Authentication Protocols
A
- Challenge Handshake Authentication Protocol
- Password Authentication Protocol
- Extensible Authentication Protocol
11
Q
Voice Over Internet Protocol
A
- It is a transmission of voice and multimedia content over Internet Protocol (IP) networks.
12
Q
Voice Communication Threats
A
- Caller ID falsification, DoS attacks, man in the middle attacks…
13
Q
Social Engineering
A
- In the context of cybersecurity it is the use of deception to manipulate individuals into revealing confidential or personal information that may be used for fraudulent purposes.
14
Q
Multimedia Collaboration
A
- Use of multimedia communication options to improve distance collaboration– for example a group of people working on a project remotely.
15
Q
Remote Meeting Technology
A
- Umbrella term used for any type of technology that allows for interaction among remote parties.
16
Q
Instant Messaging
A
- It is a technology that allows exchange of near real-time messages through a stand-alone application or embedded software.
17
Q
Email Security Goals
A
- Provide for nonrepudiation
- Restrict access to message
- Maintain integrity of a message
- Verify source of a message
- Classify sensitive content
18
Q
Email Security Solutions
A
- Secure Multipurpose Internet Mail Extensions
- MIME Object Security Purposes
- Privacy Enhanced Mail
- DomainKeys Identified Mail
- Pretty Good Privacy
- Sender Policy Framework
19
Q
Remote Access and Telecommuting Techniques
A
- Service Specific
- Remote Control
- Screen Scraper
- Remote Node Operation
20
Q
Issues to Consider When Planning Remote Access Security
A
- Remote Connectivity Technology
- Transmission Protection
- Authentication Protection
21
Q
Dial-Up Protocols
A
- Point to Point Protocol
- Serial Line Internet Protocol
22
Q
RADIUS
A
- Remote Authentication Dial-In User Service is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate users and authorize their access to the requested system or service.
23
Q
Virtual Private Network
A
- It is a technology that creates a safe and encrypted connection over a less secure network, such as the internet.
24
Q
Common VPN Protocols
A
- Point to Point Tunneling Protocol
- IP Security Protocol
- ? Authentication Header
- ? Encapsulating Security Payload Protocol
25
Virtual LAN
* Virtual LAN (Local Area Network) is a logical subnetwork that can group together a collection of devices from different physical LANs.
26
Virtualization
* Technology used to hose one or more operating systems within a memory of a single host computer.
27
Virtual Software
* Virtual Application
* Virtual Desktop
28
Virtual Application
* It is a technology where the application is separated from its underlying operating system and is streamed to an isolated environment on a target device, but is executed on the server.
29
Virtual Desktop
* Virtual desktops is an operating system that is a accessible through client software installed directly on an endpoint, which presents the desktop to the user and allows them to interact with it using a keyboard, mouse.
30
Virtual Networking
* It is a technology that enables data communication between two or more virtual machines (VM) in a virtualized computing environment.
31
Network Address Translation
* It is a process where a network device assigns a public address to a computer or group of computers inside a private network.
32
Static NAT
* Specific internal clients IP address is assigned a permanent mapping to a specific external public IP address.
33
Dynamic NAT
* It is a technique in which multiple public Internet Protocol (IP) addresses are mapped and used with an internal or private IP address.
34
Automatic Private IP Addressing
* Assignment of an IP address to a system in the event of Dynamic Host Configuration Protocol failure.
* APIPA assigns a class B IP address from 169.254.0.0 to 169.254.255.255 to the client when a DHCP server is either permanently or temporarily unavailable.
35
Switching Technologies
* Circuit Switching
* Packet Switching
36
Circuit Switching
* Concept in telecommunications that refers to a communication system that involves circuit establishment, data transfer, and circuit disconnect to be fully functional.
37
Packet Switching
* Concept in telecommunications that refers to data transmission in which a message is broken into a number of parts which are sent independently, over whatever route is optimum for each packet, and reassembled at the destination.
38
Virtual Circuits
* It is a concept that refers to transporting data over a packet switched computer network so that it appears as there is a dedicated physical layer link between the source and destination end systems.
39
WAN Technologies
* Wide Area Network Technologies are used to connect distant networks, nodes, and individual devices together.
40
Integrated Services Digital Networks
* Integrated Services Digital Network (ISDN) is a set of communication standards for digital telephone connection and the transmission of voice and data over a digital line.
41
Basic Rate Interface
* Telecommunications interface used on an Integrated Services Digital Network (ISDN) that offers customers connection with two B channel and one D channel.
* B channel is used for data transmission while D channel is used for call establishment and management.
42
Primary Rate Interface
* It is a telecommunications interface standard used on an Integrated Services Digital Network (ISDN) for carrying voice and data transmissions between the network and a user.
43
WAN Connection Technologies
* X.25 WAN
* Frame Relay
* ATM
* SMDS
44
X.25 WAN Connection
* It is a standard set protocols used for packet-switched communications over a wide area network-a WAN.
* It uses permanent virtual circuits to establish point to point connection between two systems or networks.
45
Frame Relay Connection
* It is a data link layer, digital packet switching network protocol technology designed to connect Local Area Networks (LANs) and transfer data across Wide Area Networks (WANs).
46
ATM
* Asynchronous transmission mode is a cell switching WAN communication technology by fragmenting communication into 53-byte cells..
47
SMDS
* Switched Multimegabit Data Service is a connectionless packet switching technology. Used to connect multiple LANs.
48
Synchronous Digital Hierarchy and Synchronous Optical Network
* Fiber optic high speed networking standards.
49
Specialized Protocols
* Synchronous Data Link Control
* High Level Data Link control
50
Dial-Up Encapsulation Protocols
* Point to Point Protocol us an encapsulation protocol designed to support transmission of IP traffic over dial up point to point protocols.
51
Transparency
* Feature of a service or security control that ensures it is unseen by users.
52
Transmission Integrity Verification
* Done by using a checksum called a hash total.
53
Hash Total
* Hash total is a function that represents numerical sum of one or more fields in the file, including data not normally used in calculations.
54
Transmission Logging
* It is a form of communications focused auditing.
55
Security Boundary
* Division between one secured area and another or a division between secured and unsecured area.
56
Denial of Service
* It is an attack where the attackers attempt to prevent legitimate users from accessing the service.
57
Distributed Denial of Service
* It is an attack that occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
58
Eavesdropping Attack
* Attack where someone tries to steal information that computers, smartphones, or other devices transmit over a network.
59
Replay Attacks
* Network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed.
60
Modification Attacks
* In this type of attack, captured packets are altered and then played against a system.
61
Hyperlink Spoofing
* Falsifying information, including falsifying relationship between a URL and its trusted, original destination.
62
Phreaker
* Attack meant to breaks into the telephone network illegally to make free long-distance phone calls or to tap phone lines.
63
Fax Security
* Fax security is improved by using encryption and training users to counter social engineering. The goal is to prevent interception.
64