Chapter 4 Flashcards
Application programming interface (API)
set of routines, standards, protocols, and tools for building software applications
Allow different software applications to communicate with eachother to exchange data, features, and functionality
Bit
Representation of data (zero or 1) at Layer 1 of the Open Systems Interconnection (OSI) Model
Broadcast
one to many form of sending internet traffic
Byte
unit of digital information that most commonly consists of eight bits
Cloud computing
model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction
Community cloud
cloud infrastructure provisioned for exclusive use by specific community of consumers
De-encapsulation
opposite process of encapsulation, where bundles of data are unpacked or revealed
File Transfer Protocol (FTP)
standard internet protocol (and program) used for the transfer of computer files from a server to a client on a computer network.
Fragment attack
Attacker fragments traffic in such a way that the system is unable to put data packets back together- exploiting the IP fragmentation process
Hybrid cloud
combination of public cloud storage and private cloud storage
Infrastructure as a Service (IaaS)
provider of core computing, storage and network hardware and software that is the foundation organizations can build and then deploy applications
Internet Control Message Protocol (ICMP)
IP network protocol standardized by Internet Engineering Task Force (IETF) through RFC 792 to determine if a particular service or host is available
Man-in-the-Middle
attack where adversaries position themselves in between the user and system so they can intercept and alter data traveling between them
Internet Protocol (IPv4)
standard protocol for transmission of data from source to destinations in packet switched communications networks and interconnected systems of such networks
Microsegmentation
Part of zero-trust strategy that breaks LANs into very small, highly localized zones using firewalls or similar technologies
Oversized Packet Attack
purposely sending a network packet that is larger than expected or larger than can be handled by the receiving system, causing the receiving system to fail unexpectedly
Packet
Representation of data at Layer 3 of the Open Systems Interconnection (OSI) model
Payload
primary action of a malicious code attack
Payment Card Industry Data Security Standard (PCI DSS)
information security standard that applies to merchants and service providers who process credit or debit transactions
Platform as a Service (PaaS)
web application development middleware environment that allows applications to be built in the cloud before they’re deployed as SaaS assets
Private cloud
cloud computing platform implemented within corporate firewall under control of the IT department
Protocols
set of rules to implement and control some type of association between systems
Public cloud
cloud infrastructure provisioned for open use by general public
Simple Mail Transport Protocol
standard communication protocol for sending and receiving emails between senders and receivers
Software as a Service (SaaS)
cloud customer uses a cloud provider’s applications running within a cloud infrastructure
Spoofing
faking the ending address of a transmission to gain illegal entry into a secure system
Transport Control Protocol/Internet Protocol (TCP/IP) Model
Internetworking protocol model created by the IETF: specifies 4 layers of functionality
-Link Layer (physical communications)
-Internet Layer (network-to-network connection)
-Transport Layer (basic channels for connections and connectionless exchange of data between hosts)
-Application Layer- other protocols and user application programs make use of network services
a foundational network communication framework that defines how data is transmitted over networks, including the internet, using a four-layer architecture: application, transport, internet, and network access
VLAN
virtual local area network (VLAN)- logical group of workstations, servers, and network devices that appear to be on the same LAN despite their geographical distribution
VPN
virtual private network (VPN)- built on top of existing networks to provide secure communications for transmission between networks
WLAN
wireless local area network (WLAN)- group of computers and devices in the same vicinity, forming a network based on radio transmissions rather than wired communications
Zenmap
graphical user interface (GUI) for Nmap Security Scanner- open source application that scans networks to determine everything is connected
Zero Trust
removing design belief that the network has any trusted space. Security managed at every level