108 Networks Flashcards
Host/Client
Host- a computer connected to a computer network or the internet
Client- a application or system that accesses a remote service on another computer system
Application Server
computer which houses the application programs to ‘serve’ them to client computers
Hub
a hardware device that is used to network multiple computers together
Switch
hardware device used to network multiple computers together
Router
a hardware device that routes data from a LAN to another network connection
WAP
Wireless Access Point- a device, such as a wireless router, that allows wireless devices to connect to a network
Proxy Server
a server that all computers on the local network have to go through before accessing information on the internet
Firewall
can be either hardware or software based. limit the data that can pass through it and protects a networked server or client machine from damage by unauthorized users
VPN Concentrator
Used to create encrypted tunnels between hosts
Back-up
the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event
Repeater
a wireless repeater is a device used to increase the effective coverage of our wireless network
Layers of routing
Access- desktop layer
Distribution- LAN-based and layer 3 switches
Core- core of the network, backbone, high-end switches and high-speed cables
Topology
interconnection of the various elements of a computer network
LAN
computer network covering a small physical area
WAN
computer group that covers a broad area
MAN
large computer network that usually spans a city or large campus
GAN
network used for supporting mobile communications across an arbitrary number of wireless LANs
OSI Model
Physical-signal transmission
Data Link-delivery and receipt of data
Network-routing packets across the network
Transport- end-to-end transport of data
Session- communications sessions between machines
Presentation- preparing the data for different interfaces
Application- supports application and end-user processes
TCP/IP Model
Network Access Layer- physically sent
Internet Layer- packages data into IP datagrams
Transport Layer- comms session management between host computers
Application Layer-how host protocols interface
IPV4
connectionless protocol - 32 bits
IPV6
vastly larger address space than IPV4 -128 bits
NIPRNET
used for processing information up to Unclassified
SIPRNET
used for processing information up to Secret
JWICS
used for processing information up to SCI
DoDN (GIG)
all encompassing communications project of the US DoD
DISN
DOD consolidated worldwide enterprise level telecommunications infrastructure that provides end-to-end info transfer
NMCI
primary network for continental US users
ONE-NET
common and secure infrastructure to OCONUS Navy locations
IT21
serves as primary network for afloat commands
Machine Language
lowest-level programming language
Assembly Language
programmers use either high-level programming language or assembly language
High-Level Language
programming language with strong abstraction from the details of the computer
Operating System
software consisting of programs and data that runs on computers
Application
Computer Software designed to help the user perform singular or multiple related specific tasks
Virus
can only spread from one computer to another
Worm
self-replicating computer program
Trojan
malware that appears to perform a desirable function for the user prior to run or install, but instead, facilities unauthorized access of the users computer system
Backdoor
method of bypassing normal authentication
Phishing
criminally fraudulent process of attempting to acquire sensitive info such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communications
Network Enumeration
discovering as much as possible about the target, identifying al potential avenues of attack, and attempting to compromise a network
Buffer Overflow
occurs when a program or process tries to store more data in a buffer than it was intended to hold
SQL Injection
type of security exploit in which the attacker adds SQL code o a Web for input box to gain access to resources or make changes to data
Dictionary Attack
defeating cipher or authentication mechanism by trying to determine its decryption key or paraphrase by looking in the dictionary
Privilege Escalation
act of exploiting a bug or design flaw in software app to gain access to resources that would normally be protected from an app or user
Brute Force Attack
used to break encryption of data
Social Engineering
act of manipulating people into performing actions or divulging confidential information
Public Key Infrastructure (PKI)
a framework for creating a secure method for exchanging information based on public key cryptography
Purpose of DNS
Domain Name Service- translated internet domain and host names to IP addresses