CNS Flashcards
the connection between a wireless and wired network
Access point
Provides dial-in and dial-out connections to the network
Access server
Directly connect two+ clients, no access point Infrastructure Mode – connects endpoints to a central network, not directly to each other, need access point and wireless clients for IM mode wireless
Ad hoc mode
Used to match an IP address to a hardware MAC address. It sends out broadcast to a network node to reply with its hardware address. It stores the address in a dynamic table for the duration of the session, so it requests are only sent the first time
Address Resolution Protocol
IP uses the destination IP to transmit packets thru networks until delivered
Addressing
Asymmetric. More downstream bandwidth up to 18,000 feet over single copper cable pair
ADSL, Asymmetric Digital Subscriber Line
Infinite wave form, continuous signal, varied by amplification
Asynchronous communications, broadband connections, and half‐duplex links can be digital or analog.
Analog signal
Layer 4 network
Application
Provides an interface for which applications and end users can utilize networked resources.
Examples: FTP, Telnet
Application OSI
Second generation: AKA proxy server While transferring data stream to another network, it masks the data origin. operating at Application layer of OSI
Application level firewall
Layer 7: actually 3 through 7, which look at content and can involve authentication and encryption, can be more flexible and secure but also tend to be far slower.
Application Proxy firewall
Uses token passing in a star technology on coax
ARCnet
used in applications that are dedicated, such as embedded systems, when individual processors can be dedicated to specific tasks at design time
AMP: Asymmetric Multiprocessing
Sends bits of data sequentially. Same speed on both sides. Modems and dial-up remote access systems
Asynchronous
very high bandwidth. It uses 53-byte fixed size cells instead of frames like Ethernet. It can allocate bandwidth up on demand making it a solution for Busty applications. Requires fiber optics
ATM: Asynchronous Transfer Mode
A decrease in amplitude as a signal propagates along a transmission medium
Attenuation
logical or physical identifier that a computer uses to distinguish different terminal input/output data streams
Access port
attack on the authentication protocol where the attacker transmits data to the claimant or verifier. Examples include a man-in-the-middle, impersonation, and session hijacking.
Active attack
illegal attaching of an unauthorized device for the purpose of obtaining access to data
Active wiretapping
When attackers send unsolicited messages via Bluetooth
Bluejacking
Targets the data or information on Bluetooth-enabled devices
Bluesnarfing
When wireless workstation is on-lined it sends out a BootP request with its MAC address to get an IP address and the file from which it should boot. Replaced by DHCP
Bootstrap Protocol
a layer 2 device that used to connect two network segments and regulate traffic
Bridge
Forwards data to all other network segments if it’s not on the local segment. Operates at level 2 (thus no IP-addressing)
Bridges
ISDN, cable modems, DSL, and T1/T3 lines that can support multiple simultaneous signals. They are analog and not broadcast technologies.
Broadband Technologies
Source packet is copied and sent to all nodes
Broadcast
Set of systems that can receive a broadcast from each other
Broadcast Domain
a device that provides the functions of both a bridge and a router
Brouter
All transmissions have to travel the full length of the cable
BUS
User initiates a connection, supplies identifying code, and then the system will call back a predetermined telephone number. Also less useful for travelling users
Callback
Checks incoming telephone number against an approval list and then uses Callback. Less useful for travelling users
Caller ID
multiple building connected to fast backbone on a campus
CAN Campus Area Network
for Ethernet. Workstations send out packet. If it doesn’t get an acknowledgement, it resends
CSMA Carrier Sense Multiple Access
non-replayable challenge/response dialog
Challenge Handshake Authentication Protocol
used by PPP servers to authenticate remote clients. Encrypts username and PW and performs periodic re authentication while connected using techniques to prevent replay attacks.
CHAP
minimum bandwidth guarantee provided by service provider to customers
CIR Committed Information Rate
Layer 5: looks at header of packet only, protects wide range of protocols and services than app-level proxy, but as detailed a level of control. Basically once the circuit is allowed all info is tunneled between the parties. Although firewalls are difficult to configure correctly, they are a critical component of network security.
Circuit Level Proxy
There must be a dedicated physical circuit path exist during transmission. The right choice for networks that have to communicate constantly. Typically for a telephone company network Voice oriented. Sensitive to loss of connection
Circuit switched network
Used to identify clients to servers via SSL (client authentication)
Client SSL Certificates
Many workstations, length. 1000Base-T – 100 M
Twisted pair to long. Cat 5 better than cat3 for interference Fiber optics immune to EMI, can be broken and high cost/expertise Topology failures
Coaxial
a cable consisting of a core, inner conductor that is surrounding by an insulator, an outer cylindrical conductor
OSI Layer 1->Physical->Wired
Coaxial cable
used to code/decode a digital data stream
Codec
Set of systems that could cause a collision if they transmitted at the same time, more number of systems in domain increases likelihood of network congestion due to more collisions
Collision Domain
layer 1 network device that is used to connect network segments together, but provides no traffic control
Concentrator
Carries multiple types of traffic like voice, video, and data
Converged Network
The merging of specialty or proprietary protocols with standard protocols, such as those from the TCP/ IP suite. The primary benefit of converged protocols is the ability to use existing TCP/ IP supporting network infrastructure to host special or proprietary services without the need for unique deployments of alternate networking hardware.
Converged Protocols
z- are attached by 2 coax cables. In one direction only. Wireless 802.11
OSI Layer 2->traffic control->Contention
IEEE 802.3
CSMA with Collision Avoidance Workstations
Only one host can send at the time, using jamming signals for the rest
OSI Layer 2->traffic control->Contention
IEEE 802.3
CSMA with Collision Detection
z-C
This layer deals with addressing physical hardware. FRAMES
Translates data into bits and formats then into data frames with destination header and source address. Error detection via checksums.
Example: bridge
Data Link Layer 2
z-also Channel Service Unit (CSU)
Digital interface device, used to terminate the physical interface on a DTE device. They connect to the closest telephone company switch in a central office (CO)
Data service unit (DSU)
Occur at Application, Presentation, and Session layers.
Data streams
a technique by which a computer is used to repeatedly dial a number (usually to a crowded modem pool) in an attempt to gain access immediately after another user had hung up
Demon dialer
DHCP
z-Dynamic Host Configuration Protocol
Saw tooth form, pulses, on-off only, these are a means of transmission that involves the use of a discontinuous electrical signal and a state change or on‐off pulses. Asynchronous communications, broadband connections, and half‐duplex links can be digital or analog.
Digital signal
an asymmetric cryptography mechanism that provides authentication
Digital signature
employs all the available frequencies simultaneously in parallel. This provides a higher rate of data throughput than FHSS. It also uses a special encoding mechanism known as chipping code to allow a receiver to reconstruct data even if parts of the signal were distorted because of interference.
DSSS, Direct Sequence Spread Spectrum
domain validation tool
DKIM, Domain Keys Identified Mail
When an attacker changes the domain name to IP address mappings of a system to redirect traffic to alternative systems
DNS Poisoning
When an attacker sends false replies to a requesting system, beating valid replies from the real DNS server
DNS Spoofing
Consists of a host with 2 NIC’s. One connected to trusted, one to un-trusted. Can thus be used as translator between 2 network types like Ethernet/token ring. Internal routing capabilities must not be enabled to make it impossible to circumvent inspection of data.
Dual homed host firewall
Fourth generation: Enables modification of the firewall rule. It provides limited support for UDP by remembering UDP packages across the network.
Dynamic Packet Filtering firewall
a passive network attack involving monitoring of traffic
Eavesdropping
forgery of the sender’s email address in an email header
E-mail spoofing
potentially compromising leakage of electrical or acoustical signals
Emanations
z-Encrypts IP packets and ensured integrity.
Header – contains information showing which security association to use and the packet sequence number. Like the AH, the ? sequences every packet to thwart replay attacks.
Encapsulating Security Payload
Using CSMA with an BUS-topology
Ethernet IEEE 802.3
More resistant than coaxial Token Ring because a token is passed by every station, a NIC that’s is set to wrong speed or error can take all network down
Ethernet twisted pair
an authentication framework. Allows for new authentication technologies to be compatible with existing wireless or point-to-point connection technologies, it was used for PPP connections
EAP, Extensible Authentication Protocol
A shield against leakage of electromagnetic signals.
Faraday Cage/Shield
allows existing high-speed networks to be used to carry storage traffic
FCoE, Fiber Channel Over Ethernet
Form of token ring that has second ring that activates on error
Leased lines use multiple lines and/or multiple vendors
OSI Layer 2->Traffic Control->Token
IEEE 802.5
Fiber Distributed Data Interface
bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.
OSI Layer 1->Physical->Wired
Fiber optics
z-a form of network data-storage solution (SAN or NAS) that allows for high-speed file transfers at upward of 16 GBps. It was designed to be operated over fiber-optic cables; support for copper cables was added later to offer less-expensive options. It can be used to support it over the existing network infrastructure. It is used to encapsulate Fibre Channel communications over Ethernet networks. Fibre Channel operates as a Network layer or OSI layer 3 protocol, replacing IP as the payload of a standard Ethernet network.
FCoE, Fibre Channel over Ethernet
For file transfers. Cannot execute remote files as programs. Authentication. Port 20 and 21
File Transfer Protocol
a group of systems that enforces an access control policy between two networks
Firewalls
a denial of service attack initiated by sending spoofed UDP echo request to IP broadcast addresses
Fraggle
IP will subdivide a packet if its size is greater than the maximum allowed on a local network
Message routing, error detection and control of node data are managed. IP, IPSEC, ICMP, BGP, OSPF, RIP, BOOTP, DHCP, ZIP, DDP, X.25, NAT and IGMP
Fragmentation
High performance WAN protocol designed for use across ISDN interfaces. Is fast but has no error correction, supports multiple PVCs, unlike X.25, packet switched technology that provides CIR, requires DTE/DCE at each connection point
Frame Relay
Over a public switched network. High Fault tolerance by relaying fault segments to working.
Frame Relay WAN
The entire range of available frequencies is employed, but only one frequency at a time is used.
FHSS: Frequency Hopping Spread Spectrum
a secure connection to another network
Gateway
T1 speed over two copper cable pairs up to 12,000 feet
HDSL, High Rate Digital Subscriber Line
extension to SDLC also for mainframes. Uses data encapsulation on synchronous serial links using frame characters and checksums. Also data link layer High Speed Serial Interface (HSSI) - Defines electrical and physical interfaces to use for DTE/DCE communications. Physical layer of OSI
HDLC, High-level Data Link Control
interception and take over of a communication session by an attacker
Hijacking
Layer 3 (Transport)
Host to Host
layer 1 network device that is used to connect network segments together, but provides no traffic control
Hub
Connect multiple LAN devices into a concentrator. Is actually a multi-port repeater (physical)
HUBS
May be software defined, but it could also use traditional network devices running as virtual machines
Hypervisor-based Network
an attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input
Injection
combination of digital telephony and data transports. Overtaken by xDSL, not all useable due to “D Channel” used for call management not data
ISDN, Integrated Services Digital Network
unauthorized access of information (e.g. tapping, sniffing, unsecured wireless communications, emanations)
Interception
Layer 2 (corresponds to OSI network layer) Defines the IP datagram and handles routing of data across networks
Protocols: IP, ARP, RARP, ICMP
Internet
Sends messages between network nodes regarding the health of the network. Also informs about rerouting in case of errors. Utility PING uses these messages to check physical connectivity of the network machines
IPX, Appletalk, and NetBEUI are non-IP protocols
ICMP, Internet control message protocol
? is global, ? is local for use within companies and ? can be used e.g. by your customers and clients but is not public.
Internet, Intranet, Extranet
z-All hosts have an IP address. Each data packet has an IP address of sender and recipient. Routing in network is based upon these addresses. Datagram service is considered unreliable because there’s no guarantee that the packet will be delivered, not even that its delivered only once and no guarantee that its delivered in the same sequence that its sent
32 bits long, IPv6 is 128 bits long
Internet Protocol
Converged protocol that allows location-independent file services over traditional network technologies. Cost less than Fiber. Standard for linking data storage sites
iSCI, Internet Small Computer Interface
a networking storage standard based on IP. This technology can be used to enable location-independent file storage, transmission, and retrieval over LAN, WAN, or public Internet connections.
It is often viewed as a low-cost alternative to Fibre Channel.
iSCSI, Internet Small Computer System Interface
forging of an IP address
IP address spoofing
an attack that breaks up malicious code into fragments, in an attempt to elude detection
IP fragmentation
z-Operates at Network Layer of OSI
Enables multiple and simultaneous tunnels
Encrypt and authenticate
Build into IPv6
Network-to-network use
Creates a private, encrypted network via a public network
Encryption for confidentiality and integrity
IPSEC
Encryption via Tunnel mode (entire data package encrypted) or Transport mode (only datagram encrypted)
Only works with IP at Network layer of OSI NON IP-sec compatible
IPSEC Compatible
PRI (Primary Rate Interface) bandwidth of 1.544 Mbps, faster than BRI’s 144 Kbps
ISDN
Fifth generation: Application level Firewall Runs in windows NT, modular, kernel based, multiplayer session evaluation. Uses dynamic TCP/IP stacks to inspect network packages and enforce security policies.
Kernel Proxy Firewall
z-Cisco developed its own VPN protocol called which is a mutual authentication tunneling mechanism.
It does not offer encryption. It was not widely deployed and was soon replaced by L2TP. Both operate at layer 2. Both can encapsulate any LAN protocol.
L2F, Layer 2 Forwarding